The safest option is obvious, don’t try to access its contents, but if you absolutely had to, what steps would you take to minimize/contain any potential harm to your device/network?

  • over_clox@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    4 months ago

    It doesn’t have to be a drive though. A random USB stick could actually be a virtual keyboard in disguise, ready to execute a scripted payload by simply injecting all the keystrokes as if it’s any other ordinary keyboard.