USB-C has brought the world much more powerful ... finding the correct resistor value to set the limit lower. Then, hacking open the cable, the original resistor on the Lenovo connector was ...
Identifying malicious USB-C cables is no easy task since they are designed to look just like regular cables. Scanning ...
A charging cable hack demonstrated by Jon Bruner from Lumafield ... explained in a post on X how tiny electronic devices can be concealed within a USB-C charging cable in such a way that they ...
When you’re just hacking away at something ... If there’s an emarker inside your USB-C cable, it’s going to need some power, and USB-C has a way to provide power to it – it’s called ...
A single cable that works with Apple’s lightning, micro USB and USB-C charging ports? WSJ’s Michael Hsu has the fix. Photo/video: Drew Evans/The Wall Street Journal.
The man behind the hack, security researcher Thomas Roth ... attacker to gain low-level access through specially crafted USB-C cables or devices. Once access is achieved using the vulnerability ...