<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: USB charging dangers and USB Condom</title>
	<atom:link href="http://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 15 Apr 2026 10:33:58 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/comment-page-1/#comment-1807262</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jul 2023 15:25:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21673#comment-1807262</guid>
		<description><![CDATA[Flying this weekend? This $6 USB condom will protect your data from suspicious outlets
Better to have USB data protection and not need it, than need it and not be prepared
https://www.zdnet.com/article/flying-this-weekend-this-6-usb-condom-will-protect-your-data-from-suspicious-outlets/]]></description>
		<content:encoded><![CDATA[<p>Flying this weekend? This $6 USB condom will protect your data from suspicious outlets<br />
Better to have USB data protection and not need it, than need it and not be prepared<br />
<a href="https://www.zdnet.com/article/flying-this-weekend-this-6-usb-condom-will-protect-your-data-from-suspicious-outlets/" rel="nofollow">https://www.zdnet.com/article/flying-this-weekend-this-6-usb-condom-will-protect-your-data-from-suspicious-outlets/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/comment-page-1/#comment-1807261</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jul 2023 15:24:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21673#comment-1807261</guid>
		<description><![CDATA[OSOM launches USB-C privacy cable that protects your phone from ‘juice jacking’
https://9to5google.com/2023/06/22/osom-privacy-cable-juice-jacking/]]></description>
		<content:encoded><![CDATA[<p>OSOM launches USB-C privacy cable that protects your phone from ‘juice jacking’<br />
<a href="https://9to5google.com/2023/06/22/osom-privacy-cable-juice-jacking/" rel="nofollow">https://9to5google.com/2023/06/22/osom-privacy-cable-juice-jacking/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/comment-page-1/#comment-1780425</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 17 Sep 2022 07:56:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21673#comment-1780425</guid>
		<description><![CDATA[USB C condom
https://www.amazon.com/PortaPow-NA-USB-C-Data-Blocker/dp/B082WDHS22/ref=pd_lpo_3?pd_rd_i=B082WDHS22&amp;th=1]]></description>
		<content:encoded><![CDATA[<p>USB C condom<br />
<a href="https://www.amazon.com/PortaPow-NA-USB-C-Data-Blocker/dp/B082WDHS22/ref=pd_lpo_3?pd_rd_i=B082WDHS22&#038;th=1" rel="nofollow">https://www.amazon.com/PortaPow-NA-USB-C-Data-Blocker/dp/B082WDHS22/ref=pd_lpo_3?pd_rd_i=B082WDHS22&#038;th=1</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/comment-page-1/#comment-1731269</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 24 Oct 2021 20:01:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21673#comment-1731269</guid>
		<description><![CDATA[Charging smartphone from USB without fear
http://www.obddiag.net/usb-power.html]]></description>
		<content:encoded><![CDATA[<p>Charging smartphone from USB without fear<br />
<a href="http://www.obddiag.net/usb-power.html" rel="nofollow">http://www.obddiag.net/usb-power.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/comment-page-1/#comment-1537526</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 16 Feb 2017 10:59:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21673#comment-1537526</guid>
		<description><![CDATA[Please stop charging your phone in public ports
http://money.cnn.com/2017/02/15/technology/public-ports-charging-bad-stop/

I know the feeling: Your battery is low, but you have to keep tweeting. You see a USB port or an outlet in public, plug in your device and feel the sweet relief of your phone charging.

That comfort could be shattered by an invisible attacker collecting information while your phone is plugged in to a hacked outlet.

&quot;Just by plugging your phone into a [compromised] power strip or charger, your device is now infected, and that compromises all your data,&quot; Drew Paik of security firm Authentic8 explained. Authentic8 makes Silo, a secure browser that anonymizes web activity. 

 Public charging stations and wi-fi access points are found in places like airports, planes, conference centers and parks, so people can always have access to their phones and data. But connecting your phone to an unknown port has its risks.

The cord you use to charge your phone is also used to send data from your phone to other devices.

If a port is compromised, there&#039;s no limit to what information a hacker could take, Paik explained. 

And yet despite the risks, people do it all the time. Even at prominent security conferences. 

The company ran an informal social experiment to see how many people would use the public charging stations. Paik said an overwhelming number of attendees -- about 80% -- connected their phones without asking about the security. 

&quot;The majority are plugging in no problem. They are at a security conference and they should know better, but they probably feel safe,&quot; he said. &quot;The others are making fun of them. They just walk by and say, &#039;Do people really do that?&#039;&quot;]]></description>
		<content:encoded><![CDATA[<p>Please stop charging your phone in public ports<br />
<a href="http://money.cnn.com/2017/02/15/technology/public-ports-charging-bad-stop/" rel="nofollow">http://money.cnn.com/2017/02/15/technology/public-ports-charging-bad-stop/</a></p>
<p>I know the feeling: Your battery is low, but you have to keep tweeting. You see a USB port or an outlet in public, plug in your device and feel the sweet relief of your phone charging.</p>
<p>That comfort could be shattered by an invisible attacker collecting information while your phone is plugged in to a hacked outlet.</p>
<p>&#8220;Just by plugging your phone into a [compromised] power strip or charger, your device is now infected, and that compromises all your data,&#8221; Drew Paik of security firm Authentic8 explained. Authentic8 makes Silo, a secure browser that anonymizes web activity. </p>
<p> Public charging stations and wi-fi access points are found in places like airports, planes, conference centers and parks, so people can always have access to their phones and data. But connecting your phone to an unknown port has its risks.</p>
<p>The cord you use to charge your phone is also used to send data from your phone to other devices.</p>
<p>If a port is compromised, there&#8217;s no limit to what information a hacker could take, Paik explained. </p>
<p>And yet despite the risks, people do it all the time. Even at prominent security conferences. </p>
<p>The company ran an informal social experiment to see how many people would use the public charging stations. Paik said an overwhelming number of attendees &#8212; about 80% &#8212; connected their phones without asking about the security. </p>
<p>&#8220;The majority are plugging in no problem. They are at a security conference and they should know better, but they probably feel safe,&#8221; he said. &#8220;The others are making fun of them. They just walk by and say, &#8216;Do people really do that?&#8217;&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/comment-page-1/#comment-1510164</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 31 Aug 2016 10:42:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21673#comment-1510164</guid>
		<description><![CDATA[Charge Safely
Protect your mobile phone from accidental
syncing and malware!
http://syncstop.com/]]></description>
		<content:encoded><![CDATA[<p>Charge Safely<br />
Protect your mobile phone from accidental<br />
syncing and malware!<br />
<a href="http://syncstop.com/" rel="nofollow">http://syncstop.com/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: LoreanTMyott</title>
		<link>https://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/comment-page-1/#comment-1508707</link>
		<dc:creator><![CDATA[LoreanTMyott]]></dc:creator>
		<pubDate>Fri, 26 Aug 2016 03:54:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21673#comment-1508707</guid>
		<description><![CDATA[We stumbled over here coming from a different website 
and thought I might at the same time check things out.

I like a few things i see so now i am following you.
Look ahead to considering your web page for any second time.]]></description>
		<content:encoded><![CDATA[<p>We stumbled over here coming from a different website<br />
and thought I might at the same time check things out.</p>
<p>I like a few things i see so now i am following you.<br />
Look ahead to considering your web page for any second time.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/comment-page-1/#comment-1492518</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 May 2016 10:02:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21673#comment-1492518</guid>
		<description><![CDATA[Mobile USB charging is dangerous

Security company Kaspersky Lab points out that downloading a smartphone via USB includes a variety of risks.

Security Company notes that the USB interface is designed for charging, but also for data transfer. Because of this, every time the device is connected to the USB port, it will try to handshake and establish a connection. Even at this data transfer takes place, of course. 

While the phone is in charging mode - when data transmission is blocked - data is still transferred between your phone and the host device. The amount of this data depends on your platform and operating system.

 At least the master device goes information about a device, the manufacturer&#039;s name and serial number of the device.

The problem is that this information can be AT commands used to capture the SIM card telephone number and contact information. Since then, the attacker can call any phone number at the expense of the SIM card owner. 

The important thing to remember is that you never know what the unknown USB port can do to your phone.

Source: http://etn.fi/index.php?option=com_content&amp;view=article&amp;id=4517:kannykan-usb-lataaminen-on-vaarallista&amp;catid=13&amp;Itemid=101


More: 

Previous
Charging your smartphone’s battery over USB can be dangerous
https://blog.kaspersky.com/usb-battery-charging-unsecurity/12206/

Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we desperately need to stay connected — to answer an important call, receive a text message or email, whatever.

It is perfectly normal to look for any source of precious electricity on such occasion — any USB port would do. But is it safe? No. In fact, it can be dangerous: Over a USB connection someone can steal your files, infect your smartphone with something nasty — or even brick it.


https://blog.kaspersky.com/usb-battery-charging-unsecurity/12206/]]></description>
		<content:encoded><![CDATA[<p>Mobile USB charging is dangerous</p>
<p>Security company Kaspersky Lab points out that downloading a smartphone via USB includes a variety of risks.</p>
<p>Security Company notes that the USB interface is designed for charging, but also for data transfer. Because of this, every time the device is connected to the USB port, it will try to handshake and establish a connection. Even at this data transfer takes place, of course. </p>
<p>While the phone is in charging mode &#8211; when data transmission is blocked &#8211; data is still transferred between your phone and the host device. The amount of this data depends on your platform and operating system.</p>
<p> At least the master device goes information about a device, the manufacturer&#8217;s name and serial number of the device.</p>
<p>The problem is that this information can be AT commands used to capture the SIM card telephone number and contact information. Since then, the attacker can call any phone number at the expense of the SIM card owner. </p>
<p>The important thing to remember is that you never know what the unknown USB port can do to your phone.</p>
<p>Source: <a href="http://etn.fi/index.php?option=com_content&#038;view=article&#038;id=4517:kannykan-usb-lataaminen-on-vaarallista&#038;catid=13&#038;Itemid=101" rel="nofollow">http://etn.fi/index.php?option=com_content&#038;view=article&#038;id=4517:kannykan-usb-lataaminen-on-vaarallista&#038;catid=13&#038;Itemid=101</a></p>
<p>More: </p>
<p>Previous<br />
Charging your smartphone’s battery over USB can be dangerous<br />
<a href="https://blog.kaspersky.com/usb-battery-charging-unsecurity/12206/" rel="nofollow">https://blog.kaspersky.com/usb-battery-charging-unsecurity/12206/</a></p>
<p>Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we desperately need to stay connected — to answer an important call, receive a text message or email, whatever.</p>
<p>It is perfectly normal to look for any source of precious electricity on such occasion — any USB port would do. But is it safe? No. In fact, it can be dangerous: Over a USB connection someone can steal your files, infect your smartphone with something nasty — or even brick it.</p>
<p><a href="https://blog.kaspersky.com/usb-battery-charging-unsecurity/12206/" rel="nofollow">https://blog.kaspersky.com/usb-battery-charging-unsecurity/12206/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/comment-page-1/#comment-995766</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 26 Aug 2014 10:52:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21673#comment-995766</guid>
		<description><![CDATA[Here is one USB charge meter with built-in USB condom like functionality:
http://www.epanorama.net/newepa/2014/08/15/usb-charger-meter-with-protection/]]></description>
		<content:encoded><![CDATA[<p>Here is one USB charge meter with built-in USB condom like functionality:<br />
<a href="http://www.epanorama.net/newepa/2014/08/15/usb-charger-meter-with-protection/" rel="nofollow">http://www.epanorama.net/newepa/2014/08/15/usb-charger-meter-with-protection/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/09/23/usb-charging-dangers-and-usb-condom/comment-page-1/#comment-995760</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 26 Aug 2014 10:51:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=21673#comment-995760</guid>
		<description><![CDATA[This USB condom seems to be quite simple, just few resistors and two USB connectors needed....

USBCondom
https://www.crowdsupply.com/xipiter/usbcondom

A protective barrier between your device and &quot;juice-jacking&quot; hackers.

USB Condom is a product from information security R&amp;D consultancy and product development company Xipiter.]]></description>
		<content:encoded><![CDATA[<p>This USB condom seems to be quite simple, just few resistors and two USB connectors needed&#8230;.</p>
<p>USBCondom<br />
<a href="https://www.crowdsupply.com/xipiter/usbcondom" rel="nofollow">https://www.crowdsupply.com/xipiter/usbcondom</a></p>
<p>A protective barrier between your device and &#8220;juice-jacking&#8221; hackers.</p>
<p>USB Condom is a product from information security R&amp;D consultancy and product development company Xipiter.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
