iOS and Android juice jacking defenses have been trivial to bypass for years
arstechnica.comPublished: 4/28/2025
Summary
The article discusses ChoiceJacking attacks, where attackers exploit chargers as USB hosts to bypass device security, targeting both Android and Apple devices through three techniques. These methods inject input events during user consent processes, allowing access within seconds. Notably, an Apple device variant persists despite mitigations, indicating lingering vulnerabilities in some systems. This trend highlights the need for robust security measures and continuous updates to counter such advanced threats effectively.