Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> However, shipping these devices with ADB turned on creates a security nightmare because in this state they constantly listen for and accept unauthenticated connection requests.

I'm confused. I intentionally use ADB over the network sometimes, and I have to explicitly interactively allow each adb client by its key. Are they shipping boxes with adb configured to just allow any connection without any verification?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: