usb, so it does not pretend to be a keyboard or whatever, what prevents the rom to sniff your traffic?
At least it won't compromise the other device
I don't care since my connections are mostly https over tor and ssh.
But still isn't a man in the middle attack possible?
Can't a ROM setup a malicious certificate and intercept the traffic between IP layer and Application layer? This is enough to perform a MITM, right?
Try it yourself and see why it fails.
The CA certificates are stored on the laptop. Unless I manually add the malicious certificate nothing's gonna happen. Unless you perform TLS strip that is.
I meant on phone only
Обсуждают сегодня