this post was submitted on 18 May 2024
22 points (100.0% liked)
Curated Tumblr
4909 readers
3 users here now
For preserving the least toxic and most culturally relevant Tumblr heritage posts.
The best transcribed post each week will be pinned and receive a random bitmap of a trophy superimposed with the author's username and a personalized message. Here are some OCR tools to assist you in your endeavors:
-
FOSS Android Recs per u/[email protected]: 1 , 2
Don't be mean. I promise to do my best to judge that fairly.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
It's also a lot easier to do it in software, since you don't need to splice wires and leave physical traces like you would have had to do in the day.
A well-configured charger or Flash drive can do that job for you, and can spread itself.
USB charger ?
Yes, since most modern chargers and cables have internal chips to communicate capabilities with for things like fast-charging. It is not difficult to have the chip identify itself as something else, and execute a payload.
A common attack method is to have it show up as a keyboard, and execute a series of key-sequences when connected to a computer (like opening and executing things through a command prompt).
It is also why you should try and avoid plugging random USB cables/chargers into your phone/computer when out and about, since you don't exactly know if the other end is what it appears to be.