Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Lightning accessories used crypto-based verification. I would be surprised if the next iteration for USB-C is not significantly stronger. So more than a simple spoof / replay attack will likely be required.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: