Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Perhaps HID class devices do not need approval.
That would negate the entire purpose, as HID class devices are often what the malicious devices try to pretend they are - they then can act on the computer.
 
This is the main vector. A device pertaining to be a USB stick actually is a keyboard that can inject keystrokes and infect a machine.

Ok, but how are we supposed to know this is going to happen? I mean, when I plug in a USB stick, of course I want to transfer data from it, so of course I am going to give permission. How does this improve things beyond creating an extra annoying step every single time I plug a device in?
 
Ok, but how are we supposed to know this is going to happen? I mean, when I plug in a USB stick, of course I want to transfer data from it, so of course I am going to give permission. How does this improve things beyond creating an extra annoying step every single time I plug a device in?
Well if you plug it in and it asks "this USB stick is wanting to be a keyboard" then you can say "err no".

Also when you are away from the computer and it is locked, no attacker can access the ports, which has historically been a big problem with Thunderbolt and USB.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.