USB Implementers Forum (USB-IF), the organization that handles advancement in the device standard has launched the latest USB Type-C authentication program that will help secure the device from data leaks, viruses and all kinds of problems.
This program defines some verification based on cryptography for USB-C devices and chargers, as the management has decided to set up a 128-bit cryptographic authentication protocol to check devices, cables and USB-C chargers. Any device that uses this protocol can confirm the authenticity of a device or charger, including certifications and capabilities, just on the point when the connection is made, before data is transferred.
To explain it with an example, for instinct you are worried about charging your mobile phone in a public charger because you do not know where it came from or any privacy concern. The mobile could put into a policy that only allows charging through specified loaders.
The massive adoption of the USB-C standard on all types of devices, from computers to smartphones to the latest generation of iPad Pro, poses some problems. This standard has many advantages (reversible, very versatile, charging speed and transfer) also has disadvantages. The risks of malicious data transmit which could be virus or malware from public devices usage.
A company could establish some policy for employee PCs that would only give them right of access to verified storage devices. At this point, the program is simply some recommendation – no obligatory execution is required, but its creation points to future security requirements for USB-C.
Jeff Ravencraft, president and chief operating officer of USB-IF said:
“USB-IF is pleased to introduce the USB Type-C certification program to provide OEMs with the security framework flexibility that best suits their specific product requirements,” he said. “As the Type-C ecosystem continues to evolve, companies can further provide consumers with the security they expect from certified ‘USB’ devices.”
Jeff Ravencraft, imagine that it is “the only cable of the future”. Actually, as more item manufacturers adopt the USB-C, more attackers will look for ways to abuse their vulnerabilities, so the guide makes a considerable contribution to acquiring a reliable system of well-suited articles.