The USB-IF (USB Implementers Forum), nonprofit organization that works to promote the standards of the USB technology, has defined the past few hours, at the Intel Developer Forum held in Shenzhen, a new authentication protocol for devices , cables and charger USB Type-C. It is a cryptographic authentication system that allows the connected device (notebook, laptop, smartphone, etc.) to verify compliance with USB Type-C, avoiding damage due to non-standard accessories. The verification process automatically takes off as soon as the accessory is connected avoiding inappropriate transfers both power, both of data.
The benefits of adopting the new protocol will operate so on two fronts: on the one hand, the host device can easily identify and block potentially damaging cables and chargers because they are made out of spec. The power supply can only be given certificates and adhering to the standard devices. On the other hand, the control will operate at data transfer level, reducing the risk of malware and exploits that take advantage of the USB connection to spread and carry out the attack.
USB Type-C Authentication allows host systems to protect against non-compliant USB charger and reduce the risk resulting from hardware or software already in USB devices to launch an exploit that uses a USB connection. For those who travel and is concerned to recharge your smartphone at a public terminal, the smartphone may incorporate a policy that allows charging only through certified USB chargers. A company, which is responsible for protecting company assets, can set a policy in his PC to allow access only to USB storage devices are compatible.
The new authentication protocol, the USB-IF has already taken steps to integrate into specific USB Power Delivery 3.0, offers, specifically, the opportunity to prevent the recurrence of cases like the one passed to the headlines in early February, following the Google Benson Leung signaling engineer who sustained damage to a Chromebook Pixel and two USB Power Delivery using a USB cable Type-C of poor quality.
Of course, to ensure the effective protection, you will require the collaboration of all manufacturers of devices equipped with USB Type-C connector. In practical terms, in fact, the host device can support the new protocol using a combination of firmware and software updates whose issue is delegated to the respective companies. Adapters, cables and other accessories not able to receive firmware and software updates will have to be replaced with others capable of supporting the standard.
News, articles, reviews, downloads, videos and articles from the world of technology.
ads
Subscribe to:
Post Comments (Atom)
Apple Vision Pro: Day One
It’s Friday, February 2, 2024. Today is the day. You’ve been eyeing the Vision Pro since Tim Cook stepped onstage with the product at last y...
-
Image Credits: TechCrunch We had to talk about the news that rocked the crypto world this week in our Thursday episode : the Binance/...
-
Welcome back to The Interchange, where we take a look at the hottest fintech news of the previous week. If you want to receive The Interchan...
-
Hello and welcome back to Max Q! Happy Memorial Day everyone. In this issue: Astranis’ novel approach to GEO satellites Virgin Galactic’...
No comments:
Post a Comment