Hacker News new | past | comments | ask | show | jobs | submit | ObjectiveSeePee's comments login

These are normally used for targeted attacks. Unless someone is specifically after you such a device is usually safe. Sometimes the USB ID can be used to figure out the vendor but that could also be fake. You could determine something is odd by looking at what device comes up when it is connected. Does it come with drivers? A new network interface etc. Or by comparing the inside/firmware of a known good one with the model you have.


Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: