Pro@programming.dev to Cybersecurity@sh.itjust.worksEnglish · 5 天前Modern Smartphones Vulnerable to Silent ‘ChoiceJacking’ USB Attackscyberinsider.comexternal-linkmessage-square14fedilinkarrow-up139arrow-down12file-text
arrow-up137arrow-down1external-linkModern Smartphones Vulnerable to Silent ‘ChoiceJacking’ USB Attackscyberinsider.comPro@programming.dev to Cybersecurity@sh.itjust.worksEnglish · 5 天前message-square14fedilinkfile-text
minus-squarejet@hackertalks.comlinkfedilinkEnglisharrow-up2·4 天前If you have a very sensitive threat model, it can also limit charging to only when the device is off. Which is the most secure form of charging
If you have a very sensitive threat model, it can also limit charging to only when the device is off. Which is the most secure form of charging