int3.cc

The Original USB Condom

*** The USB Condom now sold on SyncStop.com  *** 

At SyncStop.com you can purchase the Original USB Condom and the new "cased" version called SyncStop ;-)

 

Have you ever plugged your phone into a strange USB port because you really needed a charge and thought: "Gee who could be stealing my data?". We all have needs and sometimes you just need to charge your phone. "Any port in a storm." as the saying goes. Well now you can be a bit safer. "USB Condoms" prevent accidental data exchange when your device is plugged in to another device with a USB cable. USB Condoms achieve this by cutting off the data pins in the USB cable and allowing only the power pins to connect through.Thus, these "USB Condoms" prevent attacks like "juice jacking"

(If you'd like some more detailed explanations these news articles and videos do a thorough job.)

 

Use USB-Condoms to:

* Charge your phone on your work computer without worrying...

* Use charging stations in public without worrying...

* Place it as an "always on" adapter on your existing USB/Sync cable and remove only when you want to sync

* Turn a normal USB cable into a "charge only"  cable

If you're going to run around plugging your phone into strange USB ports, at least be safe about it. ;-)

*** The USB Condom now sold on SyncStop.com  *** 

Why pricing things is hard...

Many people skip the INT3 "About" page and formulate opinions without understanding what is going on here. Please read that to understand why just because a project is "Open Source hardware" doesn't mean...

Learn to reverse engineer and exploit mobiles, IoT, and Embedded systems. (Public Trainings Announced)

We've announced our public EU and US trainings for 2015. Sign up today!  

Using the Shikra to Attack Embedded Systems: Getting Started

The blog system on this e-commerce platform is awful. This blogpost has been prettified and moved to Xipiter's main blog here:  http://www.xipiter.com/musings/using-the-shikra-to-attack-embedded-systems-getting-started