Hacker News new | past | comments | ask | show | jobs | submit login

> Now MG wants to get the cables produced as a legitimate security tool

Can someone explain how these could be considered a "legitimate" security tool? What legitimate use would require the cable to look like a genuine Apple cable? (I'm honestly asking.)

onsite pentesting for example. You want to train your employees to be aware of random cables and usb drives laying around, this is a good test to ensure your training worked.

The vendor is Hak5. Among the products they currently sell is a USB drive lookalike that's actually a keyboard that can send preprogrammed keystrokes.

Applications are open for YC Winter 2020

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact