You'd have more to worry about using the hotel WIFI which nobody seems to bat an eye over.
Some of my colleagues work in Russia and always stay in the same hotel. They joke about how their room is very safe from fire, because it has nine smoke detectors in it.I would not worry about the charger...the tv remote is listening to your every word while the hidden cameras are watching you.
Or it could install malware that makes your phone talk directly to a remote host.So if the unit is stealing data, it can't be transmitting it along the 120V lines (well, it technically could, but that requires even more complexity). It has to be either saving it internally or transmitting it somewhere. Saving it internally would require somebody going around to retrieve the data, and transmitting it somewhere would require something akin to a built-in cellphone. And, of course, someone on the other end receiving it. So we're talking about significant cost here.
Or it could install malware that makes your phone talk directly to a remote host.
The implementation cost is trivial.Oh sure, there are lots of ways it could be done, but my point was it's not very likely given the low probability of success and high implementation cost.
Correct. Which is why I refuse to use most complimentary wifi anywhere. Unlimited data plan for phone & iPad and click the hotspot on if my laptop needs it.You'd have more to worry about using the hotel WIFI which nobody seems to bat an eye over.
A wifi chip with antenna is about the size of your pinky nail and costs about a quarter. Collecting the data would be trivial.Saving it internally would require somebody going around to retrieve the data, and transmitting it somewhere would require something akin to a built-in cellphone. And, of course, someone on the other end receiving it. So we're talking about significant cost here.
A wifi chip with antenna is about the size of your pinky nail and costs about a quarter. Collecting the data would be trivial.
that’s not to suggest that I’m concerned about this attack vector. They are getting more data than they can deal with already without doing this.
Looks like outside of an old Defcon demo, “there are no documented cases of juice jacking ever taking place in the wild.”What was the final conclusion on these?
Any real life reports/examples of nefariousness?View attachment 118634
Looks like outside of an old Defcon demo, “there are no documented cases of juice jacking ever taking place in the wild.”
That said, if staying in certain hotels in Russia or China, I might still use my own charger.
https://arstechnica.com/information...ic-charging-stations-needs-to-stop-heres-why/
We have encrypted drives. I leave most of my work on the network drives anyway because it is backed-up daily. The Chinese won't learn much from me that they can't get from journals anyway.My employer before I retired specified that only burner phones and laptops could be taken into China. Well, not so much 'burner' as dedicated hardware devoid of data or much of anything useful. My division didn't interact with Russia, so I don't know if the policy would have been the same.
When going out to dinner in China, I would leave a stray thread or piece of lint on top of my laptop in the hotel room safe, only to see it under my laptop when I returned.My employer before I retired specified that only burner phones and laptops could be taken into China. Well, not so much 'burner' as dedicated hardware devoid of data or much of anything useful. My division didn't interact with Russia, so I don't know if the policy would have been the same.
Trying to discern if something is likely by how cost effective the technique is isn't a valid method, for three reasons. First, because some of the people playing in this space have really high budgets and don't care. Second, and probably more relevant, because bad people are often really terrible at math. It's not unusual for people to spend 10x+ what they will bring in, because they're not bright. Finally, the costs involved can sometimes be way lower than you'd think. For a USB attack, I'd expect a USB auto install driver or auto-run vulnerability would be the easiest way in, especially against a Windows computer.
As far as overseas travel, the primary risk we see is that you almost always have to hand the device to customs for inspection on the way in, sometimes demonstrating it runs. So the expectation should be that software will be installed on the device at that point to compromise the data. And for some countries, China included, anything you do remotely while in that country is going to be captured. Not might, but will be, regardless of the security that you might have in place. This extends to "secure portals" run by US companies in that country. Some maintain data centers inside that country for access while in the country, which comply with Chinese law. That means monitoring is conducted. My current job, and it's not all that high security, I can't take an issued device outside of CONUS.
Wifi access? I mostly use my phone's hotspot. If I'm at an FBO or other place with wifi with PSK I'll use that. I generally - almost never - use the captive portals. Hate them. For my personal devices I don't use a VPN. The only point I see of a commercial VPN is getting content that is blocked in your current area, and I don't do that.
Not to disagree, but I doubt much of that applies when staying at a Motel 6 in the middle of nowhere...
When going out to dinner in China, I would leave a stray thread or piece of lint on top of my laptop in the hotel room safe, only to see it under my laptop when I returned.
When going out to dinner in China, I would leave a stray thread or piece of lint on top of my laptop in the hotel room safe, only to see it under my laptop when I returned.
Enough said.
You can get around those problems if you pick up one of the Travel Routers. These are fairly inexpensive but permits you to hide behind your own router with your one SSID and password with the option of connecting your laptop to that with Ethernet. I picked up one from Amazon and love it.You'd have more to worry about using the hotel WIFI which nobody seems to bat an eye over.
You can get around those problems if you pick up one of the Travel Routers. These are fairly inexpensive but permits you to hide behind your own router with your one SSID and password with the option of connecting your laptop to that with Ethernet. I picked up one from Amazon and love it.
Stealing data is highly unlikely with modern mobile OSes that are much more wary of random USB connections than the early days. That threat model requires a sophisticated attacker to pull off.
I rarely use public USB chargers simply because they are often providing crap DC 5V power which can mess with the digitizer and is not as good for the battery as a high quality power brick.
The human is almost always the weakest in any security system but this is a pretty simple case to guard against. Just don’t make a habit of blindly tapping “Trust this device” whenever you plug into anything and you’ll be fine. If you’re really paranoid, get a usb condom.the better the OS security, the more the attacks focus on IO*
*IO - incompetent operator