this post was submitted on 18 May 2024
18 points (100.0% liked)

Curated Tumblr

3959 readers
186 users here now

For preserving the least toxic and most culturally relevant Tumblr heritage posts.

Image descriptions and plain text captions of written content are expected of all screenshots. Here are some image text extractors (I looked these up quick and will gladly take FOSS recommendations):

-web

-iOS

-android

Please begin copied raw text posts (lacking a screenshot that makes it apparent it is from Tumblr) with:

# This has been reposted here to Lemmy as part of the "Curated Tumblr Project."

I made the icon using multiple creative commons svg resources, the banner is this.

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] T156@lemmy.world 1 points 6 months ago (1 children)

It's also a lot easier to do it in software, since you don't need to splice wires and leave physical traces like you would have had to do in the day.

A well-configured charger or Flash drive can do that job for you, and can spread itself.

[–] oce@jlai.lu 1 points 6 months ago (1 children)
[–] T156@lemmy.world 1 points 6 months ago

Yes, since most modern chargers and cables have internal chips to communicate capabilities with for things like fast-charging. It is not difficult to have the chip identify itself as something else, and execute a payload.

A common attack method is to have it show up as a keyboard, and execute a series of key-sequences when connected to a computer (like opening and executing things through a command prompt).

It is also why you should try and avoid plugging random USB cables/chargers into your phone/computer when out and about, since you don't exactly know if the other end is what it appears to be.