Skip to content
Thoughtful, detailed coverage of everything Apple for 34 years
and the TidBITS Content Network for Apple professionals

USB-C Authentication Protocol to Protect against Non-compliant Devices

We’ve reported in the past that non-compliant USB-C cables and devices can damage or destroy connected hardware. To address this problem, the USB 3.0 Promoter Group has announced the USB Type-C Authentication specification, a cryptographic authentication standard for USB devices. A phone equipped with USB-C authentication could reject a connection to a non-approved charger, for instance, if it hadn’t been certified as meeting necessary specs. However, the authentication protocol could also be used to prevent devices from connecting to fully compliant devices that didn’t meet some other business requirement. That would let companies restrict access to only verified USB storage devices, but could also allow manufacturers to lock customers into a proprietary ecosystem of approved devices. In short, beware the unintended consequences!

Read original article

Subscribe today so you don’t miss any TidBITS articles!

Every week you’ll get tech tips, in-depth reviews, and insightful news analysis for discerning Apple users. For over 33 years, we’ve published professional, member-supported tech journalism that makes you smarter.

Registration confirmation will be emailed to you.

This site is protected by reCAPTCHA. The Google Privacy Policy and Terms of Service apply.