this post was submitted on 10 May 2026
17 points (74.3% liked)

Privacy

4497 readers
256 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
 

TLDW:

  • Don't trust random USB ports or cables – Public ports can steal your data (juice jacking), and malicious cables like the OMG cable look identical to normal ones but contain a hidden computer that can remotely attack your device.

  • Your car shares more than you'd expect – When you plug your phone into a vehicle, it can pull contacts, messages, and other data, which may then get shared with manufacturers, third-party services, and data brokers.

  • Built-in protections are easy to screw up – Running outdated software makes attacks more likely. Plus, you might accidentally tap "trust" on a prompt, or be too lazy to switch back from "data" to "charge only" mode, leaving you vulnerable.

  • USB data blockers physically sever the data pins – They only pass power, completely blocking any data connection at the hardware level so nothing can flow in or out. Cheap and simple.

top 8 comments
sorted by: hot top controversial new old
[–] newton@feddit.online 1 points 19 hours ago

Usb condom ?

[–] xep@discuss.online 11 points 3 days ago

Or a portable battery instead of connecting devices to untrusted USB ports.

[–] DiarrheaSommelier@lemmy.ca 5 points 2 days ago (1 children)

The problem with this solution is that your device will only charge at legacy 5V low power charging. The data pins are used to negotiate charging rates between devices and without this capability the charger will only deliver the known-safe basic low power charging rate.

[–] JimVanDeventer@lemmy.world 2 points 2 days ago

That’s why you plug your power bank into the charger and plug your phone into the power bank.

[–] 667@lemmy.radio 10 points 3 days ago

It’s mind-boggling how many people raw dog USB ports in public spaces, airplanes, and Ubers.

[–] maus@sh.itjust.works 3 points 2 days ago

While researchers have demonstrated charging-port attacks in controlled settings, as of May 2023, multiple reviews have found no credible reported cases of juice jacking on mobile OSs outside of research efforts, and experts generally assess the risk to typical users as low relative to other threats.

Its entirely a non-issue until there's literally any commercially viable real-world application of this. You should be more worried about NFC relay attacks and other real world attack vectors.

[–] NaibofTabr@infosec.pub 7 points 3 days ago
[–] Gsus4@mander.xyz 5 points 3 days ago

Or just use a power USB cable after testing that it only charges and doesn't comm with any of your devices.