USB-Port: Hacking iPhone's USB Type-C connection? There are many flaws hidden in it! Revealed in the report..
Shikha Saxena January 15, 2025 05:15 PM

Apple products are popular for their security. It is very difficult to hack Apple devices. The reasoning behind buying Apple devices for most people is that all Apple devices including iPhones are safe.

However, now a report has said that the iPhone can be hacked through a USB-port. In this, researchers have discovered some flaws. Let's know what is mentioned in this report.

Is hacking an iPhone possible?

Thomas Roth, who gives information to people about hardware security, said that Apple's iPhone models have USB ports. Hackers can break into security through their charging port. These security flaws have been found in Apple's proprietary ACE3 USB-C controller. It is an essential component in the iPhone for charging and data transfer.

It was first revealed at the 38th Chaos Communication Congress in late December, but its details have been given recently. According to this, it can be easy for hackers to hack the device through this port.

Many technical flaws are hidden.
Security researcher Thomas Roth has talked about these technical flaws. He gained information about the internal firmware and communication protocol. After this, he tried to do many new things with the controller by taking advantage of the flaws present in it, in which he became successful. After that, it has been confirmed that security can really be harmed by taking advantage of these flaws.

Breaking without permission
Roth discovered that security flaws present in the firmware can give hackers access to sensitive information present in the device. The user's personal information can be broken without permission.

Flaws in Apple's ACE3 USB-C controller can lead to risks like device manipulation. Hackers can steal personal information during data transfer or install arbitrary apps on the device by bypassing security protocols.

There is nothing to worry about
The report also said that iPhone users need not worry. Nothing has been told about how hacking can be done. The hacking process is quite difficult and not everyone can do it.

Disclaimer: This content has been sourced and edited from Dainik Jagran. While we have made modifications for clarity and presentation, the original content belongs to its respective authors and website. We do not claim ownership of the content.

© Copyright @2025 LIDEA. All Rights Reserved.