Hacker News new | past | comments | ask | show | jobs | submit login

A really sneaky method would be to create a USB suppository, that looked like a large USB key but would leave the active part inserted inside the socket after the target pulls out the seemingly defective key.



And how is the port supposed the stay functional upon removal of the key? The point of this attack is stealth.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: