this post was submitted on 11 Mar 2024
106 points (91.4% liked)

Technology

34912 readers
129 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] gravitywell@sh.itjust.works 25 points 8 months ago (2 children)

According to the researchers, "A charger can be manipulated to control voice assistants via inaudible voice commands, damage devices being charged through overcharging or overheating, and bypass Qi-standard specified foreign-object-detection mechanism to damage valuable items exposed to intense magnetic fields."

So if someone swaps your Qi charger for a malicious one they can ruin your phone (or some other device it's supposed to detect as not a phone ?) and maybe execute arbitrary voice commands... ๐Ÿฅฑ

[โ€“] michael_palmer@lemmy.sdf.org 52 points 8 months ago

Malicious charger:

[โ€“] tias@discuss.tchncs.de 21 points 8 months ago (1 children)

I don't really get how they consider this a meaningful attack vector at all. Of course I can set the phone on fire if I can replace the charger - that's pretty much always going to be true and there's no reasonable way to fix it. The only possible use I see is to do it when someone is not intentionally charging their phone, e.g. holding a malicious charger close enough when they have the phone in their pocket.

[โ€“] anachronist@midwest.social 1 points 8 months ago

Well now all we need is internet connected chargers with dodgy security...