Joke Collection Website - Blessing messages - What should we do if we find that the mobile phone charging treasure has stolen our information?

What should we do if we find that the mobile phone charging treasure has stolen our information?

Contact customer service immediately or choose alarm. However, many people want to know how the information was stolen and the principle analysis. First of all, let's analyze how to analyze and design this thing from scratch without knowing the existing technology. I guess the first thing that most people think of is iTunes, the supporting software for Apple's mobile phone management, because it has a function of backing up data. Even after the computer is swiped, as long as the data is recovered, all address books, short messages and even online information will be recovered. If the binary cow sees it, it should say that it is not enough to analyze its communication protocol against iTunes.

Well, it can be achieved. However, we in script kiddies should be similar to those who read gobbledygook, but one thing is right, and that is the communication protocol. If we can simulate the iTunes protocol and tell the iPhone that I need to back up the data for you, then we can copy the data to the storage unit according to its acceptance protocol. As for how it packages those data, unpacking according to the way it packages will restore all the data. What we analyzed above is how to get the data in the mobile phone to the storage unit, so what does it have to do with the charging treasure? People who have watched the video should notice that the mobile phone will prompt "Do you trust this pc?" When looking for charging treasure. Looking back, will there be a hint when we charge ourselves? So under what circumstances will there be a hint?

Yes, the mobile phone data cable will prompt when plugged into someone else's computer! Here is an analysis of why the normal charging treasure and computer are USB, and there is no hint at all, paving the way for later defense.

The picture was found on the Internet. The yellow part is four usb contacts, of which 1, 4 is the positive and negative poles (although there are only+and-symbols), and 2 and 3 are "D+ and D-". What is this? In fact, it is the input and output of data+ and data- data signals. In fact, from this picture, we can guess why the normal charging treasure will not prompt, but it will prompt when plugged into a strange computer. Because data signals are generated on data+ and data- of strange computers, iPhone will ask whether this device should be trusted for data interaction. Let's see how to achieve it quickly.

Design and implementation, the above principle has been analyzed so much, but it still hasn't entered the core part "How to make it quickly".