This Kills Your Computer.

Austin Evans
3 Mar 202416:47

Summary

TLDR这段视频展示了一种名为USB Kill的设备,它通过充电和释放电容器中的能量来破坏插入的设备。视频中,主持人测试了多种设备,包括笔记本电脑、游戏机和手机,结果显示USB Kill能够轻松击败大多数设备。视频强调了这种设备潜在的危险性,同时也提醒制造商需要增强对USB端口的保护。最后,主持人承诺为因测试而损坏的设备向电子前哨基金(EFF)捐款,同时警告观众不要尝试在家中重现这一实验。

Takeaways

  • 💾 USB Kill是一种能够摧毁设备的危险技术工具,通过对USB端口供电后将电力返回设备内部。
  • ⚡ 内部装有电容器的USB Kill,能够收集并突然释放大量电力,直接损坏插入的设备。
  • 🚫 使用USB Kill破坏别人的电子设备可能会触犯法律,曾有人因此入狱并被罚款。
  • 🛡️ USB Kill的存在目的是为了测试设备的USB端口是否有足够的保护措施防止此类攻击。
  • 🔍 测试结果表明,许多设备,包括笔记本电脑、游戏机和手机,对USB Kill攻击毫无防备。
  • 💻 即使是看似坚固的设备也可能轻易被USB Kill损坏,表明物理耐用性不等同于电子安全。
  • 🔌 测试包括多种类型的设备,如笔记本电脑、USB充电器、游戏控制台和智能手机,多数设备未能抵御攻击。
  • 🎮 唯一完全抵抗USB Kill攻击的设备是Samsung Galaxy Z Flip 3,显示了不同制造商在设备保护方面的差异。
  • ⚠️ 视频强调不要随意尝试使用USB Kill,并提醒用户对找到的USB存储设备保持警惕。
  • 🙏 为了弥补因测试而损坏的设备,视频制作者承诺向电子前线基金会(EFF)捐款。

Q & A

  • USB Kill是什么?

    -USB Kill是一种看似普通的USB存储器,但内部装有电容器。它能够从USB端口充电,并将电力迅速反馈给设备,从而导致设备损坏。

  • USB Kill的合法性如何?

    -使用USB Kill破坏他人的技术设备可能是非法的。有案例显示,一名学生使用USB Kill破坏学校电脑,结果被判入狱并支付高额罚款。

  • USB Kill的主要用途是什么?

    -USB Kill主要用于防御目的。制造商可能购买它来测试其设备的USB端口是否具备足够的防护和接地措施,以抵御类似的攻击。

  • 测试中使用了哪些类型的设备?

    -测试中使用了各种类型的设备,包括笔记本电脑、USB-C充电器、游戏机(如Nintendo Switch Lite)、智能手机和MacBook。

  • 在测试中,哪些设备对USB Kill显示出较强的抵抗力?

    -测试中,Apple的iPhone SE和一款2011年的MacBook Pro显示出了一定的抵抗力,虽然USB端口受损,但设备本身并未完全失效。

  • 测试USB Kill时采取了哪些安全措施?

    -视频中提到,测试完全是出于教育目的,并重申不要在家中尝试。测试中还提到了查找灭火器的准备,显示了一定的安全意识。

  • 测试中有哪些设备被USB Kill彻底破坏?

    -测试中多数设备,如Gateway Windows笔记本电脑、Dell笔记本和PlayStation 5游戏机等,都被USB Kill彻底破坏。

  • 测试中为何特别提到捐赠给电子前沿基金会(EFF)?

    -由于测试中破坏了多个设备,视频制作者承诺将根据被毁设备的价值向电子前沿基金会捐款,以补偿这些损失。

  • 为什么说不应该信任在地上找到的USB存储器?

    -因为这样的USB存储器可能是USB Kill或类似装置,能够损坏连接它的设备。这是一种安全风险。

  • 视频的最后结论是什么?

    -视频的结论是,制造带有USB端口的产品的厂商应该使用USB Kill来测试他们的产品,并采取必要措施保护设备免受此类攻击。

Outlines

00:00

⚠️ USB杀手的危险性与使用

视频介绍了一种名为USB Kill的技术设备,它通过在USB端口中插入后充电并将电力迅速释放回设备来破坏设备,导致设备无法使用。原理是内部装有电容器,一旦插入USB端口,便开始充电并在短时间内将电力返还给设备,从而损坏设备的电路。作者警告说,尽管这可能看起来是一个有趣的恶作剧,但使用USB Kill破坏他人设备是违法的,并提到了一个实例,某人在学校使用导致被罚款并入狱。视频强调,USB Kill的存在是为了防御目的,使制造商能够测试他们的设备是否能抵抗此类攻击。视频还展示了对不同设备的测试,包括不同版本的USB Kill,并捐赠破坏的设备价值给电子前哨基金会(EFF),一个致力于互联网和数字设备权利的组织。

05:02

🔌 对多种设备进行USB Kill测试

视频继续使用USB Kill对不同类型的设备进行测试,包括笔记本电脑、USB充电器、任天堂Switch Lite、三星Galaxy Z Flip 3和PS5。测试结果表明,即使是看似坚固的设备也可能对USB Kill攻击无能为力。例如,一个被认为是最耐用的笔记本电脑在测试中也被破坏。尽管有一些设备如三星Galaxy Z Flip 3在初代USB Kill测试中幸存下来,但在使用最新版本USB Kill进行测试时,大多数设备都未能幸免。视频还尝试了不同的测试模式,包括直接插入和通过应用触发USB Kill,结果显示这种技术对设备构成了严重威胁。

10:03

📱 对更多设备的测试和结果

进一步的测试包括对iPhone SE和多款MacBook进行USB Kill测试,这些设备显示出不同程度的抗击能力。iPhone SE在测试后失去了Lightning端口的功能,但设备本身仍然可用。一款旧款的MacBook Pro虽然USB端口被破坏,但整体设备仍然工作正常。然而,一个全新的M2 MacBook Air在测试后虽然仍然可以启动,但所有的USB-C端口和MagSafe充电端口都不再工作,意味着一旦电池耗尽,设备将无法再被充电使用。这些测试揭示了即使是最新的设备,也可能对USB Kill攻击脆弱,强调了制造商需要对这种攻击采取防护措施的重要性。

15:05

💡 结论与制造商的责任

视频总结强调了USB Kill的危险性和潜在的破坏力,同时也是对制造商的一个警告,鼓励他们测试自己的设备以抵抗类似的攻击。视频作者承诺为因测试而损坏的设备向电子前哨基金会(EFF)捐款,以支持其在互联网自由和数字设备安全方面的工作。作者强调不要随意信任或使用地上捡到的USB设备,以避免不必要的风险和损失,视频以呼吁制造商增加对设备的防护作为结尾,提醒观众在处理不明USB设备时要保持警惕。

Mindmap

Keywords

💡USB Kill

USB Kill是一种专门设计来测试设备对于电压攻击的防护能力的设备。它通过USB端口充电,然后将电力迅速释放回设备中,可能导致设备损坏。在视频中,USB Kill被用来测试各种带有USB端口的设备,以检验这些设备的电压攻击防护能力。

💡电容器

电容器是USB Kill内部的关键组件,负责存储从USB端口吸收的电力,然后在短时间内释放这些电力,形成对设备的攻击。视频中提到,USB Kill的内部充满了电容器,这些电容器使得USB Kill能够执行其破坏性功能。

💡法律后果

视频强调使用USB Kill破坏他人财产可能面临法律后果,包括监禁和罚款。这一点通过一个在学校使用USB Kill破坏多台计算机的案例进行了说明,凸显了虽然这些设备可以用于测试和防御目的,但滥用可能会导致严重后果。

💡防御目的

USB Kill的存在主要是为了防御目的,使设备制造商能够测试其产品的电压攻击防护能力。视频中提到,理论上,任何带有USB端口的设备制造商都应购买USB Kill,以确保他们的设备能够抵御此类攻击。

💡捐款

视频制作者承诺,为了弥补测试过程中可能造成的设备损坏,他将向电子前沿基金会(EFF)捐款。这表明视频制作者认识到测试的潜在负面影响,并试图通过支持有关数字权利的组织来做出积极贡献。

💡制造商

视频中多次提到设备制造商,强调他们应该对自己的产品进行USB Kill测试,以确保设备能够抵御此类攻击。这体现了视频的一个目标是促使制造商增强对电压攻击的防护,从而保护消费者。

💡USB-C

USB-C是一种新型的USB接口,相较于传统的USB接口(如USB-A),它提供了更快的数据传输速度和更高的电力输出。视频中探索了带有USB-C端口的设备相对于其他类型的USB端口的设备在面对USB Kill时的表现,以评估USB-C是否提供了更好的防护。

💡安全警示

视频强调了对消费者的安全警示,特别是不要随意使用发现的USB设备,因为它们可能是USB Kill这样的破坏性设备。这一点突显了对电子设备安全的普遍关注,并鼓励观众对待未知的USB设备持谨慎态度。

💡电子前沿基金会(EFF)

电子前沿基金会是一个致力于维护数字时代公民自由的非营利组织。视频中提到的捐款目的地表明,视频制作者支持EFF在互联网自由、设备安全等领域的工作。

💡损坏风险

视频通过使用USB Kill测试多种设备来展示设备可能面临的损坏风险。这些测试旨在揭示哪些设备能够抵抗这种攻击,哪些设备则容易受到损坏,从而强调了制造商在设计产品时考虑电气安全的重要性。

Highlights

Introduction of USB Kill as a highly dangerous technology capable of destroying devices by discharging capacitors.

Explanation of USB Kill's mechanism: charging capacitors through a USB port and then discharging the power back, potentially damaging the device.

Legal consequences highlighted through an example of misuse in a school, resulting in jail time and a significant fine.

USB Kill's intended use for defensive purposes by manufacturers to test device shielding and grounding against USB power surges.

Testing of USB Kill on various devices, including a Gateway Windows laptop, to evaluate modern device resilience.

Donation pledge to the Electronic Frontier Foundation for the value of any destroyed devices during the tests.

Warning against trying similar tests at home, emphasizing educational purposes of the video.

A durable laptop's failure to withstand USB Kill, challenging assumptions about physical toughness and USB port defense.

Experimentation with USB Kill on a USB-C charger, revealing its vulnerability to power surges.

The impact of USB Kill on a Nintendo Switch Lite, underscoring the widespread susceptibility of various devices.

Testing the original and newer versions of USB Kill on a Samsung Galaxy Z Flip 3, showing improved resilience in newer devices.

Investigation of the effect on an iPhone SE, demonstrating partial damage with the Lightning port no longer functioning.

A 2011 MacBook Pro's USB port gets disabled by USB Kill, yet the device remains partially functional.

The failure of a PS5 and a new M2 MacBook Air when exposed to USB Kill, highlighting significant vulnerabilities in high-end devices.

Conclusion emphasizing the dangerous potential of innocuous-looking USB sticks and a call for manufacturers to test and fortify their devices against such attacks.

Transcripts

00:00

- This is USB Kill,

00:01

and it is the most dangerous piece of tech that I own.

00:04

Let me show you how it works.

00:05

All right, I'm just gonna plug this thing in,

00:07

we're gonna go for it.

00:09

Simple as that.

00:10

Super, super duper dead.

00:13

So these may look like innocuous USB sticks,

00:16

but inside they are filled with capacitors.

00:18

So this is the V1 that we did a video on

00:20

all the way back in 2017.

00:22

The way this works is that it has

00:23

a bunch of little capacitors

00:24

so when you plug it in it charges those capacitors

00:27

via power from the USB port,

00:29

and then turns around and sends all that power

00:30

directly back into the device,

00:32

in many cases straight up killing it.

00:34

Now before you get any bright ideas

00:36

about how this would be a hilarious prank

00:38

to play on your friends,

00:39

keep in mind that this can actually

00:41

be illegal if you use it

00:42

to destroy other people's technology.

00:44

Someone tried this at a school,

00:46

and killed a bunch of school computers.

00:47

Guess what?

00:48

He went to jail,

00:49

and had to pay like a $50,000 fine.

00:51

Now the reason that a device like this exists

00:54

is purely for defensive purposes.

00:56

So theoretically if you are a manufacturer

00:58

of any number of devices that have a USB port,

01:01

you would buy one of these things to make sure

01:03

that whatever shielding you've done,

01:04

whatever grounding you've done on your USB

01:06

is actually sufficient to support

01:08

protecting against a device like this.

01:10

What I really wanna do is use this newest version

01:13

of the USB Kill on an unfortunate number of devices

01:18

to see exactly how far we've come

01:19

over the last eight years with devices

01:21

that have USB-C, that have theoretically better shielding,

01:24

and how many are going to succumb

01:26

to the most basic looking USB stick you've ever seen.

01:30

So while I hope that most of these devices survive,

01:33

I will be making a donation

01:34

for the value of any devices destroyed

01:36

to The Electronic Frontier Foundation,

01:39

which is a great organization

01:39

that does a lot of work around the internet,

01:41

computers, devices.

01:42

But if I can say anything before I get started it is this.

01:46

Do not try this at home.

01:47

I am doing this testing so that you do not have to.

01:50

And hopefully this video serves as a warning

01:52

not only to you who maybe want to be

01:54

a little bit suspicious of your friend

01:56

walking around with that black USB stick.

01:58

And for manufacturers who watch this video,

02:00

and hopefully decide to put a little bit more effort

02:02

into defending their devices

02:04

against such a simple basic attack.

02:06

Let's give it a try, shall we?

02:09

So our first proper test

02:10

is going to be with a Gateway Windows laptop.

02:13

Now this is significantly newer

02:14

than the Chromebook that we just killed,

02:16

and I will say that while I have low expectations to this

02:19

I'm gonna try something that's a little bit different

02:22

compared to the first generation USB Kill.

02:24

The normal mode you plug it in,

02:25

it charges capacitors and sends it back.

02:27

Because this has a built in battery,

02:28

theoretically I can just trigger it,

02:30

and it would just send that power

02:32

in even to a completely offline device.

02:34

So let's see what happens.

02:36

Here goes nothing.

02:38

So now that it is plugged in

02:39

I'm going to trigger USB Kill.

02:43

(USB Killer clicks) There it went.

02:44

Hear it?

02:45

All right, I'm gonna stop it.

02:46

It will send power for as long as I want via the app.

02:49

So what you just heard, that click,

02:50

that was all that power coming through,

02:52

and likely blowing something on this system.

02:55

So I'm gonna disconnect USB Kill,

02:57

and I am going to try to fire this up.

02:59

Nothing.

03:00

Nothing at all. (cash register dings)

03:01

I mean that's extra scary, if I'm honest with you

03:04

because theoretically you could come back to your computer

03:07

that is completely dead,

03:07

and have no idea what went wrong.

03:10

There's no signs of anything.

03:11

I smelt something for a split second,

03:13

and now it's kind of gone.

03:14

Okay, let's move on to some devices

03:17

that hopefully are a little bit more robust

03:20

than this very affordable Windows device.

03:25

Yikes.

03:26

Next up we have one of the most durable laptops

03:30

I have ever seen.

03:31

I would hope that Dell have put in

03:33

the engineering resources

03:34

to prevent against an attack like this,

03:36

but just because it is physically tough has no bearing

03:39

on whether or not they actually did the work

03:41

to properly ground

03:42

and shield USB ports.

03:43

So let's give it a try.

03:45

So I'm gonna use this in classic mode,

03:46

which means that because the laptop is on

03:48

it should kill it within two seconds,

03:50

or Dell have done a good job of defending it.

03:53

All right, here we go.

03:56

(USB Killer clicks) Ooh.

03:59

And that is dead.

04:00

So that one was extra.

04:02

I heard two cracks.

04:03

It's almost like it pushed through one side,

04:05

and then it went all the way through on the other.

04:07

Wow.

04:08

I mean I can try to get this thing to boot up,

04:10

but that looked...

04:12

Oh no, hell no, dude.

04:13

Extra fried.

04:14

Wow.

04:15

I thought this one actually might have a shot.

04:17

If you wanna see a followup video to this, let me know.

04:20

I might actually try to open some of these up,

04:22

or find someone who can help me

04:23

actually kind of get to the bottom

04:24

of exactly what is dying on these systems.

04:27

But, wow, that is one rugged laptop

04:31

that absolutely no match for the USB Kill.

04:34

That is legitimately terrifying.

04:36

Oh man, this video's gonna get expensive real quick.

04:38

I thought some of these were gonna survive.

04:41

- [Alex] It's for a good cause.

04:42

- It is for a good cause.

04:43

It's all for a good cause.

04:44

The more things that die

04:45

the more money I'm gonna donate.

04:47

But wow, that is okay.

04:50

All right, well let's just keep it on rolling.

04:52

So next I'm gonna do something

04:53

that's very unorthodox.

04:54

I'm gonna try a USB-C charger.

04:57

Now, general word of advice,

04:59

don't trust USB sticks you find,

05:01

and also don't trust random USB ports.

05:03

But I wanna see what happens

05:05

when we connect the USBq Kill to a charger.

05:08

Can someone find the fire extinguisher?

05:10

Why are you the firefighter?

05:12

I don't like this.

05:14

- Well, I like starting the fires.

05:15

- No.

05:16

Okay.

05:17

Again, I will just give you a fair warning,

05:18

do not try this at home,

05:20

we are doing this purely for educational purposes,

05:22

and I mean that.

05:23

I wanna know what happens here.

05:24

Hopefully nothing because there is

05:27

a lot of electronics in something like this

05:28

which is a little GaN charger,

05:30

but let's find out.

05:31

Okay.

05:32

Three, two, one.

05:39

Interesting.

05:40

So what I assume is that if it doesn't detect a signal

05:42

it won't work by default.

05:44

So I'm gonna try manually triggering this now.

05:47

So I'm gonna plug it in again,

05:48

and we're gonna send it.

05:49

Ready?

05:51

(USB Killer clicks) Okay, I heard a click.

05:52

Nothing's on fire.

05:54

So we're gonna unplug that.

05:55

Now I guess let's plug a normal USB into this,

05:56

and see if the charger still functions.

05:59

Absolutely nothing.

06:00

It killed the charger too.

06:01

Oh my God.

06:02

So that's the power of this latest USB Kill

06:06

because previously it only worked

06:08

when you plugged it directly into a device,

06:10

where it would take the power and send it back.

06:11

But because this can be manually triggered,

06:13

and there's also other stuff I didn't get into.

06:15

There's a little magnetic ring

06:17

that you can wipe over this thing.

06:18

You can set programs.

06:19

This thing is ridiculously dangerous.

06:22

It has killed every single thing we've tried.

06:24

Oh my God.

06:26

This one, this one's gonna hurt.

06:28

This is a Nintendo Switch Lite.

06:31

As we all know, the best version of the Switch.

06:34

I have modified this one.

06:36

I did not do a great job with the modifications

06:39

which is why it has been selected

06:40

for this particular excursion.

06:43

Boy, considering that we have killed

06:46

a whole bunch of devices right now,

06:48

my odds of a Nintendo Switch Lite surviving

06:51

are incredibly low.

06:53

So I'm gonna try it in regular mode,

06:55

I think it should just work,

06:56

but if not I will manually trigger it.

06:57

All right, here we go.

06:58

Switch Lite.

07:00

Let's see what we got.

07:03

- [Ken] No.

07:04

- That was the loudest snap.

07:07

Oh my God.

07:07

- [Joanna] That made me sad.

07:09

- That made me sad too.

07:10

I spent a lot of hours on this.

07:11

I, maybe naively hoped,

07:14

that some companies had actually built in some protections

07:17

to try to help defend against this kind of stuff.

07:19

I'm not seeing it at all.

07:20

We have much more expensive items coming up.

07:22

And now I'm like "Do they even have a chance?"

07:25

- [Alex] If you thought that was bad,

07:28

we're gonna have to sacrifice a flippy boy.

07:31

- Oh God.

07:33

This is the part of the video

07:34

that makes me deeply uncomfortable.

07:36

This is a Samsung Galaxy Z Flip 3.

07:41

Now because the USB Kill 4 has been

07:44

absolutely destroying everything we've got,

07:46

I actually wanna try,

07:47

before we do that one,

07:48

to go with the original USB Kill.

07:50

So in our first video,

07:51

this one was very dangerous.

07:54

It did actually not kill the USB-C devices.

07:58

At least one of the USB-C devices survived.

08:00

Here goes nothing.

08:00

The USB Kill 1.0, let's give it a try.

08:08

Oh, word.

08:09

Yeah, totally fine, unaffected at all.

08:12

Okay.

08:14

Now let's try with USB Kill 4. (laughs)

08:17

I'm not ready.

08:18

My heart is pounding right now.

08:20

Okay.

08:21

USB Kill 4.

08:22

Let's go.

08:23

Three, (dramatic music)

08:24

two, (dramatic music)

08:25

one.

08:27

(dramatic music)

08:30

Okay.

08:32

That is very promising.

08:33

This is good.

08:34

At least it won't automatically die.

08:36

I'm gonna hit the button,

08:36

I'm gonna see what happens.

08:37

Everyone ready?

08:38

Three, two, one.

08:42

No.

08:47

Oh, it restarted.

08:48

It restarted.

08:52

Oh my God.

08:53

Yes, yes.

08:54

- I love how you just threw it at me.

08:56

Like get away from my Z Flip.

08:58

You like hit me in the face.

09:01

Jesus.

09:03

- Wait, but wait, no.

09:03

Wait, we might have...

09:04

- [Alex] Oh, oh.

09:05

- It did start to boot up,

09:06

and it now is not.

09:07

Come on, come on, come on little Z Flip, you can do it.

09:10

Oh my God.

09:11

Okay, okay, okay.

09:12

We're in here.

09:13

So screen is functional.

09:15

Okay, now let me try to see if power works though

09:17

'cause that would obviously be

09:18

a massive, massive deal if the power no longer works.

09:21

Plug it in.

09:22

Oh my God.

09:23

- [Alex] Wow.

09:25

- I am legitimately impressed.

09:27

- Suck it Jerry Rig Everything.

09:30

- Zach, we love you.

09:31

- Not durable phone my ass.

09:33

(everyone laughs)

09:34

- Let's move on to a device that boy oh boy I hope survives,

09:40

a PS5.

09:41

Now, you might see this,

09:42

and think "Austin, you lost your marbles."

09:44

And to that I would say "Probably if this video

09:46

"keeps going on for much longer."

09:47

So for reference this is a PS5 1100.

09:50

I highly doubt that there's any difference

09:52

between the PS5 models,

09:53

but just so you know PS5 1100.

09:55

So let's plug it into this front USB port,

09:58

and hope, cross your fingers, cross your toes,

10:02

cross your eyes.

10:05

I don't know. (laughs)

10:05

Three, two, one.

10:11

- [Ken] No.

10:12

- Oh my God.

10:14

This one hurts so much.

10:16

I like to remind everyone

10:18

that I will be making a substantial donation to the EFF

10:21

after this video.

10:22

A much more substantial donation than I thought.

10:24

Let's give it a shot.

10:25

Hold on, it might not be dead, dead.

10:27

I'm gonna unplug it for a second.

10:29

Let's see if we can get any signs of life

10:30

out of this guy.

10:31

All right, so let's plug it back in and...

10:34

Oh, it's dead.

10:35

It is dead.

10:36

- [Ken] Oh, oh, oh.

10:37

(gentle music)

10:40

- Okay, I see lights.

10:41

No, it turned off.

10:42

Okay, wait, hold on.

10:42

But that was something.

10:43

No other device has given us a sign of life

10:46

after it completely died.

10:47

Z Flip restarted,

10:48

but this tried for a second.

10:50

Hold on.

10:51

It's probably mortally wounded.

10:53

There are signs of life with this,

10:56

but yikes.

10:58

This is an iPhone SE,

11:00

which is, of course, outfitted with a Lightning port,

11:02

which has traditionally been fairly resistant

11:04

to these kind of attacks.

11:05

And in our original video Apple products

11:07

were fairly durable, right?

11:09

So my hope is that this will survive,

11:12

but theoretically this device was designed

11:16

specially with Lightning in mind.

11:18

Here goes nothing.

11:20

Again, I'll show you it's fully functional.

11:22

In fact, you know what we'll do,

11:23

we'll do something real sad.

11:24

We're gonna record front facing video.

11:28

Okay, let's just really hope

11:29

that this does not work.

11:30

I don't want this to work.

11:32

Three, two, one.

11:36

Ooh.

11:37

Ooh, I heard a click

11:39

and it didn't do anything.

11:39

Let me unplug it right now.

11:40

Whoa, whoa, whoa.

11:42

Oh, well...

11:43

Well hang on.

11:44

Wait, that's good, that's good.

11:45

That's what happened with the Z Flip.

11:46

It triggered and is restarting.

11:49

This looks fine.

11:50

Touch screen is functional.

11:52

Let's see, is our video on there?

11:53

Probably not.

11:54

No, the video didn't save.

11:55

That's fine.

11:56

Let's just make sure that it still accepts power.

11:58

Oh wow, okay.

12:00

So what we have here is a still functional device,

12:02

but a Lightning port which no longer works.

12:05

All right, so I'm gonna put this on,

12:06

my Z Flip is a wireless charger.

12:08

Let's see if it works.

12:09

Okay, it does work.

12:10

So the fact that we have no longer any support

12:13

for our Lightning port to function at all

12:15

is probably gonna be a very expensive repair,

12:17

and yes you can work around with wireless charging,

12:19

but that's still a pretty major downside

12:21

for the device.

12:22

But technically at least it is not completely dead.

12:25

So we'll give that a,

12:27

not a thumb's down,

12:28

a thumb's wiggle.

12:30

A wiggle thumbs.

12:31

So now we're down to MacBooks.

12:35

Plural MacBooks unfortunately.

12:37

This is 2011, I think.

12:40

A 2011 15-inch MacBook Pro.

12:42

So we're just gonna go straight USB-A into it,

12:45

and see what happens.

12:46

I don't think this one's gonna make it.

12:48

Plug it into our MacBook in three,

12:51

two, one.

12:54

(USB Killer clicks) Oh, okay.

12:56

That's very good.

12:57

Very, very good.

12:58

So we heard the click, so it discharged.

13:01

Now, does the system actually work?

13:02

It does.

13:03

So I'm gonna plug it into a functioning port

13:05

so you can see that the whole keyboard lights up.

13:08

So at least one of our USB ports still work.

13:09

So I can go...

13:11

That works.

13:12

Now let me plug it into the port

13:13

that we just USB Killed.

13:15

And nothing.

13:18

Okay.

13:19

So I'm not gonna give that a complete pass,

13:22

because that USB port is dead.

13:24

But unlike something like an iPhone,

13:26

in which if you kill the Lightning port on an iPhone

13:28

it is not useless

13:29

but in deep, deep trouble.

13:31

A single dead USB port on a device

13:34

is actually kind of something

13:35

you can work around, right?

13:36

This has two USB-As.

13:38

We'll give this a mostly pass.

13:39

I will say Apple devices

13:42

and Samsung devices, the only ones

13:43

that have had any shot against this thing.

13:45

Last but certainly not least,

13:47

we're gonna try a brand new M2 MacBook Air.

13:52

You might ask, "Austin, that doesn't look very brand new."

13:54

Well, it's a midnight one,

13:55

so I touched it once,

13:56

and it now looks like this.

13:57

So there's a few things going for this.

13:58

Not only is it a brand new device,

14:00

but it's also using, of course USB-C,

14:02

which we've seen is a little bit more resilient

14:04

across the board.

14:05

But certainly Apple's implementation

14:06

based on our last video was quite robust.

14:08

The last one survived, right?

14:12

It should be fine, right?

14:13

Someone make me feel better right now.

14:14

It should be fine, right?

14:16

- [Ken] Midnight?

14:16

More like good night.

14:18

- Ok.

14:18

- [Ken] Is that what you're looking for?

14:19

- No, that's actually the opposite

14:21

of what I'm looking for but thank you.

14:22

All right, let's plug this in to a USB-C port

14:25

in three, two, one.

14:28

(USB Killer clicks)

14:29

Okay.

14:30

I'm gonna unplug it.

14:31

Very good sign.

14:32

MacBook is still functional.

14:33

Okay.

14:34

So at a bare, bare minimum it is gonna be

14:36

hopefully like the other MacBook

14:38

in that maybe the port could be damaged,

14:40

but the system didn't blink an eye.

14:43

So we're gonna first start

14:44

by plugging into a USB port that I did not use.

14:48

Oh snap, no charge.

14:51

Okay, let me try the other USB-C.

14:56

Oh, that's bad.

14:57

Both USB-C ports are not accepting a charge.

15:00

Now, I'm gonna try USB,

15:01

but also before that I wanna try connecting via MagSafe

15:04

to see if that works

15:06

since that is a physically different connector.

15:08

Ready and...

15:10

Ooh, that looks good.

15:12

Ooh, no, it's not.

15:14

So the MagSafe cable thinks

15:16

that the device is fully charged

15:18

and good to go,

15:19

which seems normal,

15:20

but here's the thing,

15:21

the system says it is not charging right now.

15:23

So none of the USB-C ports

15:24

or the MagSafe work.

15:26

So even though on the surface this is fine,

15:29

this is no big deal,

15:30

the MacBook's still working,

15:31

it didn't skip a beat,

15:32

but as soon as this runs out of charge

15:35

it's dead forever.

15:36

So I'm gonna use a USB-C dongle.

15:38

I'm gonna try with the keyboard.

15:40

I'm also gonna try to plug it in a different way

15:41

and restart it.

15:42

I wanna give this a fair shot

15:44

before we totally call it dead,

15:45

but wow.

15:47

Wow.

15:48

This video has been a roller coaster.

15:50

Nothing.

15:53

No.

15:54

So there's no data to these ports either.

15:55

So out of all the devices we've tested today,

15:58

the winner,

15:59

and the only one that survived unscathed,

16:01

is a Z Flip 3?

16:03

Who would have guessed that?

16:05

Thank you very much for watching this video.

16:07

Do not try this at home.

16:08

This has hopefully been enlightening for you

16:10

to understand that something as innocuous

16:13

as a little USB stick that you find on the ground

16:15

could be incredibly, incredibly dangerous.

16:17

And this is a plea to manufacturers who watch this video,

16:20

do you make a product that has a USB port?

16:23

You should test it with the USB Killer,

16:25

and do whatever you can to defend against it.

16:28

I, of course, will be donating a very large sum

16:30

to the EFF to make up for some of the devices

16:34

that we have killed here.

16:35

I gotta sit down after this one, man.

16:36

This was the most stressful video I've shot

16:38

in a long, long time.

16:40

Whatever you do,

16:42

don't trust the USB stick,

16:44

it's not safe.