Every other page on Tom’s Hardware is loading for me just fine but this article is just pulling up a completely blank document?
USB-C cable CT scan reveals sinister active electronics — O.MG cable contains a hidden antenna and another die embedded in the microcontroller
Submitted 3 weeks ago by misk@sopuli.xyz to technology@lemmy.world
Comments
SnotFlickerman@lemmy.blahaj.zone 3 weeks ago
JohnnyCanuck@lemmy.ca 3 weeks ago
They probably pulled the article since it was bullshit, based on the other comments.
cypherpunks@lemmy.ml 3 weeks ago
same here; other articles there load fine but this one gives me HTTP 500 with content-length 0.
(the empty body tag in your screenshot is generated by firefox while rendering the zero-length response from the server, btw.)
lurch@sh.itjust.works 3 weeks ago
I hope you’re not hacked and the attacker is blocking URLs that could help you find out.
Shdwdrgn@mander.xyz 3 weeks ago
Same here, I was wondering what was going on.
floofloof@lemmy.ca 3 weeks ago
The headline is clickbait I think. The whole point of the O.MG cable is to hide electronics in the connector. The analysis of what can be seen in there may be interesting, but it’s not like this is secret knowledge.
shop.hak5.org/products/omg-cable
OutlierBlue@lemmy.ca 3 weeks ago
So the manufacturer isn’t spying on you, it just designed a product so someone else could hack you instead? That doesn’t make it sound any better.
The end result is the same: be careful what cables you plug into your device.
kn33@lemmy.world 3 weeks ago
Sure, but this is clickbait at best. It’s not a revelation that this cable contains that hardware.
nondescripthandle@lemmy.dbzer0.com 3 weeks ago
Its designed to be used for pen testers so they don’t have to spenr $20,000 on the alternative cable. Its a single cable thats costs like $200, so im not really worried many people are going to get hacked because they accidentally bought a $200 cable.
AnyOldName3@lemmy.world 3 weeks ago
The intended use for this kind of product is that you hire a company to break into your company, and then tell you how they did it so that criminals (or, if you’re someone like a defence contractor, foreign spies) can’t do the same thing later. Sometimes they’re also used by journalists to prove that the government or a company isn’t taking necessary precautions or by hobbyists at events where everyone’s aware that everyone else will try to break into their stuff. There’s typically vetting of anyone buying non-hobbyist quantities of anything, and it’s all equipment within theoretical reach of organised crime or state actors, so pentesters need to have access, too, or they can’t reasonably assess the real-world threat that’s posed.
floofloof@lemmy.ca 3 weeks ago
Yes, if someone used one of these against you, you could be in trouble. The company that makes it also makes a detector that can spot it:
shop.hak5.org/…/malicious-cable-detector-by-o-mg