A certification is presented that validates whether USB-C cables meet the safety standard

USB-C cable replacement-macbook-1

The USB Implementers Forum (USB-IF) today announced the launch of the USB Type-C Authentication, a software protocol that will serve as a line of defense to protect devices that integrate USB-C connections from cables that do not comply with the security standard and that are potentially capable of damaging said devices.

With this specification both computers and other devices with USB-C ports will be able to confirm the authenticity of a USB device or USB charger with items such as certification status and verification of the power voltage used, along with ensuring that no malicious software is present and capable of infecting the host computer.

USB-C-Certification-logo-0

By using this protocol, host systems can confirm the authenticity of a USB device or USB charger, including aspects such as the status of products (description, capacity and certification). All of this happens right at the moment when a wired connection is made - before inappropriate power or data can be transferred.

This authentication allows computers to protect themselves against USB chargers that do not meet the standard and thus mitigate the risks of hardware failure or even malicious software embedded in such USB devices that tries to exploit a USB connection
This specification comes after some USB-C cables were able to damage electronic devices. If we remember, the Google engineer, Benson Leung, from whom we talk in another post, spent weeks checking USB-C cables for weeks that were sold by Amazon after a third-party cable he bought was able to break down his Chromebook Pixel.

Leung's work led Amazon to ban third-party retailers from offering USB-C cables that do not adhere to standard specifications issued by the USB-IF, and it has also achieved that conditions have been decreed within the standard that have been presented today.

The most important characteristics of this issued certification are:

  • A standard protocol for USB Type-C certificate authentication on chargers, devices, cables, and power supplies
  • Support for authentication via any of the USB data bus or USB power delivery communication channels
  • Relying on 128-bit security for all cryptographic methods
  • This specification of cryptographic methods must be internationally accepted for the existing certificate format, digital signature, hashing and generation of random numbers.

The 12-inch MacBook Retina already have built-in security measures to protect you from non-compliant cables, but the new USB Type-C authentication feature will offer another layer of protection that Apple must implement. Current machines only accept third-party USB-C power adapters if they comply with USB Power Delivery specification, and if too much voltage is detected, the USB-C ports on the MacBook turn off.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.