Beware the Sneaky Choicejacking: Why Public Phone Chargers Are a No-Go!

Think public chargers are safe? Think again. A new threat called choicejacking sidesteps security, tricking phones into granting access without user approval. Faster than a blink, it uses fake inputs to enable data transfer. Remember, when it comes to public USB ports, even free power can come at a hefty price.

Pro Dashboard

Hot Take:


In the fast-evolving world of cyber espionage, charging your phone in public might be the digital equivalent of leaving your front door wide open. With the new “Choicejacking” technique, cybercriminals have upgraded from petty theft to grand larceny, all while you’re blissfully unaware and sipping your latte. So, unless you fancy having your selfies critiqued by some random hacker, maybe it’s time to keep those charging habits on a tight leash.

Key Points:

  • Choicejacking is the new successor to juice jacking, exploiting smartphones by mimicking user actions.
  • The attack bypasses security prompts and can be executed in less than 133 milliseconds.
  • Public charging stations, especially at airports and cafés, are prime targets for potential choicejacking attacks.
  • Both Android and iOS users are vulnerable, despite visible prompts and settings.
  • To stay safe, avoid public USB ports, keep software updated, and use personal charging solutions.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?