iPhone charger hacking device developed by cybersecurity researcher

John Newman jnn at synfin.org
Thu Oct 3 16:48:33 PDT 2019


Any url you send from the "news break" app diverts readers to
the "news break" app installer, to read the whole article.

Just use trusty copy and paste if you wanna share a link ;)



On October 3, 2019 10:03:42 PM UTC, jim bell <jdb10987 at yahoo.com> wrote:
>Okay, how will I know this based on what I can see?   I'd like to NOT
>do what you object to, but I don't know how to determine what is going
>on,
>            Jim Bell
>
>On Thursday, October 3, 2019, 11:36:28 AM PDT, Razer <g2s at riseup.net>
>wrote:  
> 
>Because it isn't a link to the article. It's CLICKBAIT to get suxers to
>install an app.
>
>On October 3, 2019 10:26:09 AM PDT, Jim Bell <jdb10987 at yahoo.com>
>wrote:
>Okay, can you explain what I should do, or not do?  
>On Oct 3, 2019 9:35 AM, Razer <g2s at riseup.net> wrote:
>
>
>Stop sending links to articles that are really links to an app
>installation page, K?
>
>Use the app your own fucking self to go to the link and send the damn
>link to the article.
>
>https://www.mic.com/p/iphone-charger-hacking-device-developed-by-cybersecurity-researcher-18815970
>
>Ps. This news broke in AUGUST. I hope you didn't have to pay for that
>app. It seems a little "Slow".
>https://techcrunch.com/2019/08/12/iphone-charging-cable-hack-computer-def-con/
>
>
>Rr
>Sent from my Androgyne dee-vice with K-9 Mail
>
>
>
>On October 3, 2019 1:14:58 AM PDT, jim bell <jdb10987 at yahoo.com> wrote:
>>https://www.newsbreakapp.com/n/0MzB0h8z?s=a3&pd=02h1yVjC
>>
>>iPhone charger hacking device developed by cybersecurity researcher
>>
>>Mic
>>
>>
>>>>
>>A cybersecurity researcher has successfully found a means to mass
>>produce an Apple iPhone charging cable lookalike that can allow a
>>hacker to remotely access someone else's computer, reported Vice. When
>>a victim uses the cable to connect a device to their computer — for
>>everyday reasons like charging or transferring files — a hacker can
>>jump onto the connection to gain access. Once the intruder has access
>>to the computer, they can run commands and rummage through your data.
>>
>>Shared from News Break 
>
>
>
>
>
>-- 
>Sent from my Android device with K-9 Mail. Please excuse my brevity.  
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 4414 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20191003/62609561/attachment.txt>


More information about the cypherpunks mailing list