- Edited
treequell You can temporarily enable data transfer when you need to do USB data transfer. Is that not sufficient?
What if the USB device has been tampered with? You don't know, because even if it has a trustworthy name on it, it can be faked by fraudsters and put on the market through systems like Amazon comingling (comingling means that the shopping site provider, such as Amazon, mixes the 'same' USB sticks from different sellers and doesn't know which item is from which seller).
This has already been proven to happen with USB sticks by faking them to have more space and then deleting the oldest files to keep the fake alive. What will happen when people like this move on to more malicious things?
treequell For Bluetooth devices, there already exists a per-device permission menu. That's provided as part of AOSP.
I know there are restricted permissions, but if I connect a bluetooth device that is requesting input device permission from the system, its immediately granting input device permission and the device could start the attack.
Half of the Blutetooth permission system is to actively deny a permission after the point where there is oppurtunity to attack.
raccoondad This is not true, android nor GOS is zero trust with USB or Bluetooth devices.
This is the problem I am addressing
raccoondad If you cannot trust every device you use, I have serious questions....
How do I know if the company behind my Bluetooth headphones or the remote clicker I use for my flash cards is trustworthy?
For example, even if I trust the company that makes a USB stick, the USB stick I get when I buy it on Amazon could be from a counterfeiter through Amazon Comingling.
raccoondad Its toggable...
And then i get attacked
de0u A link to the article might be productive.
The original article is in a non english language, i will search later for a english source.
de0u USB is a complicated family of protocols, and there are some attacks that could move pretty quickly, especially attacks targeted at a specific version of a specific OS. But there are limits to what can be done, and how quickly it can be done, by something pretending to be a keyboard and/or mouse. Among other things, the attacker would need to be able to send input events to the system without seeing what's happening. All in all, the summary description we have so far sounds like it might be more alarmist than accurate.
I am not sure exactly how this is working but i think the device can know if you are using Android, iOS, Windows, Linux, MacOS etc and then it know where are the buttons to press.