This seems a bit like the spiritual successor to leaving malicious USB sticks laying around and waiting to see if someone will pick one up and plug it into their computer.
Although I suppose if you have physical access to a workspace, you could surreptitiously replace someone's existing lightning charging cable.
This technique was discussed in documents shared by Edward Snowden, from which we learned that the federal government got in to the business of making and selling USB cables that had this capability.
We also learned that for this to be fully effective, the USB cable had to trigger malicious code on the host PC, but I am not sure if this was something the three-letter agency had to get there by planting it, or if the driver code was built in to Windows by Microsoft. So yes, we've known about this general t
"It's a dog-eat-dog world out there, and I'm wearing Milkbone underware."
-- Norm, from _Cheers_
Spiritual successor (Score:3)
This seems a bit like the spiritual successor to leaving malicious USB sticks laying around and waiting to see if someone will pick one up and plug it into their computer.
Although I suppose if you have physical access to a workspace, you could surreptitiously replace someone's existing lightning charging cable.
Re: (Score:2)
We also learned that for this to be fully effective, the USB cable had to trigger malicious code on the host PC, but I am not sure if this was something the three-letter agency had to get there by planting it, or if the driver code was built in to Windows by Microsoft. So yes, we've known about this general t