Path: csiph.com!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail From: Andy Burns Newsgroups: comp.misc,comp.security.misc Subject: Re: [CM] the USB killer now exists and is being mass-produced Date: Wed, 7 Dec 2016 18:56:13 +0000 Lines: 16 Message-ID: References: Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Trace: individual.net qvKRKojzKIj4nbGZKY7hPAdC0ksV2LJaO/zMxzRgqud4rA9JQN Cancel-Lock: sha1:KZbrDN6cO7uoyifblwsRtX+3RTA= User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.5.1 In-Reply-To: Xref: csiph.com comp.misc:12609 comp.security.misc:1219 RS Wood quoted: > "The USB Killer is shockingly simple in its operation. As soon as you > plug it in, a DC-to-DC converter starts drawing power from the host > system and storing electricity in its bank of capacitors (the > square-shaped components). When the capacitors reach a potential of > -220V, the device dumps all of that electricity into the USB data > lines" You could use a USB Condom (now known as a SyncStop) to isolate the data pins, no doubt the USB Killer II will send the high voltage back on the 5V rail