This must be the only product of the line I'm confident I do not need. Clearly I'm missing something. What security risk am I exposing my stack to when using say, a phone charger?

Reply to this note

Please Login to reply.

Discussion

If the phone charger and cord are both capable of transmitting data, then you have a new attack surface for a device that has otherwise never been plugged into another computer.

Ex: USB phone charging ports in airports are notorious for being modified by bad actors to steal your phone data when you plug it in.