This story made me think of all the ways drug smugglers get products into the US. Hiding them in tires, gas tanks, watermelons and pineapples etc. Now the hackers in the wires of cables.
Except that there's an awful lot of people who refuse to pay for good cables, thinking there's no difference between an Apple or an Anker and gas station garbage...
And there's an awful lot of counterfeit Apple goods on Fakebook Marketplace.
And worse, selecting Apple or major brand cables on Amazon won't protect you. Amazon co-mingles its own stock ("Sold by Amazon") and third party seller stock ("Sold by XXX") in its warehouses. This means that even if Amazon itself is selling a genuine item, a buyer could be shipped a counterfeit.I'll just keep buying Anker cables from Amazon.
They will sell to "bad actors." 😆
Exactly. Well, at least this personHaha, yeah, that’ll teach people to try and save money!
It is legal to grow tobacco in your own backyard. If you are in the UK.Why isn’t it legal to grow tobacco in your backyard - because it can seriously harm you ?!?!
Didn’t the Kremlin a few years ago say they were going to use typewriters again because they were more secure.None of your data is safe unless you have old enough devices from a simpler time, and they’re ineligible for updates. Maybe a Snow Leopard mac or original ipad or something. You just have to stay off the web with it to avoid security shortcomings. Leave your actual computer offline & restricted to your intranet only. Then consider a new device a burner, without any personal data on it, for internet use. Probably the only way forward in the total surveillance 0 privacy era.
We do something a little like this at my company for other reasons, just not so extreme. But i could see it for anyone who prefers a solid sense of security.
Exactly. This is only useful for targeted attacks, especially since it's $180. Plus, in its standard form it would only be usable against somebody that you know regularly uses a wired keyboard with their iPhone or iPad.BUT... the 1mile radius for connectivity means the seller would need to know the buyers location AND be able to track them (eBay/Amazon sale should be meaningless). I think this would be more of a 'stalker tool' than a honeypot.
If you were in a situation where someone could swap out your OEM cable for this one, it would be a problem. (unattended cable at home, school, Starbucks, etc)
That's why this cable is a key part of my travel tech setup:In unrelated news:
I was flying to/from Europe about a week ago; on the long flight, the airplane had a charging port for mobile devices, but only via their built-in Android tablet / device in the back of the seat.
I was like... really? You want me to charge my phone by plugging into this unknown device? Wut?
Why not just give me a power plug so I can use my power brick?
I'm going to call BS on this. A powerful compute module with memory, wifi with somehow a one mile range, and location services for geofencing, all in half a USB-C connector?
The original cable is almost two years old, but that's the one that worked in the opposite direction, allowing a hacker to send keystrokes TO your device. Plus, that original one was USB-A, and it didn't have nearly the same range.No way it would work at a mile or even close to that, unless it hits a repeater. Where this would really work is at the airport or something similar - leave it plugged into the wall and let people charge their phones with it while you exploit them.
Btw, this hack is almost two years old.
No, and that's where this is misleading. iOS does not send your keystrokes out the Lightning port, ever, and without compromising the device in some other way (e.g., adding malware to a jailbroken iPhone), there's no way to capture this information.Interesting. So when I am typing on my phone it is also sending signals to whatever is connected to my Lightning port? I could see this having some type of SOC on it where it mimics a supported hardware device but wouldn't the user have to accept "trust this computer" for it to log anything on iPhone or iPad?
Yep I reviewed an excerpt from the developer, just a simple key logger as you explained. The text of most articles on this subject is misleading.No, and that's where this is misleading. iOS does not send your keystrokes out the Lightning port, ever, and without compromising the device in some other way (e.g., adding malware to a jailbroken iPhone), there's no way to capture this information.
This is a keylogger, plain and simple. It logs keystrokes from an external keyboard that's plugged into your iPhone or iPad, but since almost nobody does that, it's not really much of a threat in the real-world.
This is just one reason why there are some reversions back to paper for communication and data. (Paper can be stolen/copied; but it can’t be hacked)None of your data is safe unless you have old enough devices from a simpler time, and they’re ineligible for updates. Maybe a Snow Leopard mac or original ipad or something. You just have to stay off the web with it to avoid security shortcomings. Leave your actual computer offline & restricted to your intranet only. Then consider a new device a burner, without any personal data on it, for internet use. Probably the only way forward in the total surveillance 0 privacy era.
We do something a little like this at my company for other reasons, just not so extreme. But i could see it for anyone who prefers a solid sense of security.
That's why a USB data blocker is essential for traveling. The ones from Portapow work well:In unrelated news:
I was flying to/from Europe about a week ago; on the long flight, the airplane had a charging port for mobile devices, but only via their built-in Android tablet / device in the back of the seat.
I was like... really? You want me to charge my phone by plugging into this unknown device? Wut?
Why not just give me a power plug so I can use my power brick?