Tuesday, January 26, 01:54
Home inet USB C: new technology for greater security

USB C: new technology for greater security

As more and more devices use USB-C to charge and transfer data, there is a need for improved technology. The USB Implementers Forum announced (PDF) changes to USB C authentication for more security.

This new security feature will allow devices to verify that USB-C connections are legal, both for charging and for data transfers.USB-C

With the upcoming technology, the device will immediately verify that a USB-C connection is indeed legal, and will prevent or allow the connection accordingly.

For example, suppose you want to charge your device to a public charger. At the moment the risks are great. No one can know if the public charger has been "tampered with" and your data is compromised.
However, with USB C authentication, the connected device could verify that the charging source is secure and block access to your data if it is not.

Features of the upcoming USB-C:

A standard protocol for certifying chargers, devices, cables and power sources USB Type-C
Support for authentication via either USB data channel or USB Power Delivery communication channels
Products using the authentication protocol have control over the security policies that need to be implemented and applied
Depending on 128-bit security for all encrypted methods
The specifications report existing internationally accepted cryptographic methods for certificate format, digital signing, hash and random number generation

Naturally, device manufacturers and operating system developers should include support for the new USB-C authentication.

Let us hope that most developers / developers will recognize the value of technology and incorporate it into their devices or their operating system.



Please enter your comment!
Please enter your name here

In a world without fences and walls, who needs Gates and Windows



COVID-19 vaccines: Ways to protect supply chains

The development of vaccines for COVID-19 in such a short period of time has created many challenges and these are not only related to ...

How do insurance companies "enhance" ransomware attacks?

Ransomware attacks have increased significantly, with experts warning that their victims should not pay ransom to hackers ....

Russia: "US may be planning retaliation for SolarWinds hack"!

The Russian government warns the country's organizations about possible cyber attacks that the US may carry out, as "retaliation" for the hack ...

iPhone: How to see which apps have access to your contacts

Some iPhone privacy issues go deeper than accessing your contacts list, which exposes your contacts to ...

COVID-19: Google makes vaccination clinics available

Google CEO Sundar Pichai said Monday that the company will make its facilities available to become clinics ...

Netflix offers "studio quality" audio upgrade on Android

Do not be surprised if Netflix sounds better the next time you run a marathon with rows on your Android phone ...

Will Bitcoin return to $ 40.000? There is concern!

Bitcoin lovers who take his return above the level of $ 40.000 for granted have been worried because the demand ...

Avaddon ransomware: Its operators threaten with DDoS attacks to get ransom!

Lately, more and more ransomware gangs tend to threaten their targets with DDoS attacks in order to secure profits ....

Volunteer firefighters will be trained through VR simulation

Volunteer firefighters in the Australian state of Victoria will soon have access to the virtual reality (VR) training that will be available in ...

Tesla: Accuses its former employee of stealing her confidential data!

On January 23, Tesla sued former employee Alex Khatilov for stealing 26.000 confidential documents, including trade secrets. The software ...