Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you bother to read more than the abstract, you’d realize this isn’t an attack. It’s a framework for possibly creating new attacks, which after extensive research yielded precisely zero code execution bugs. Gotta print something after wasting a whole semester I suppose.

When I say unsubstantiated rumor, this is what I’m talking about.



> this isn’t an attack

I'm aware. As I said above:

> any documented cases of juice jacking happening are [...] PoCs


Then you should learn what a PoC is. This is not a PoC. It’s a “we tried this and failed”. It’s a disproof(by exhaustion)-of-concept.


I'm curious about what you think they "tried and failed", and what exactly success looks like for you.

You mentioned "code execution bugs" - what is that exactly to you? I presume you don't count HID emulation, so I'd be interested in what exactly does count.


Code refers to computer code, sometimes called “shell code”. Execution refers to getting that code to run.

They didn’t get anything unexpected to happen on the device. You really should read the paper, it’s a masterclass in making nothing sound like something.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: