As a customer of USB Kill, your testing results help to provide vital insight into which hardware devices are vulnerable to a USB power surge attack.
Millions of consumer, enterprise and public sector devices: cell phones, computers, ATMs, ticket machines, cars, airplanes - have USB interfaces, and are potentially vulnerable to attack.
As part of its research, the USB Kill team performed extensive testing, but we are looking to the community to help establish the largest and most comprehensive database of hardware that is vulnerable to a USB Killer device.
Contributing is easy: We have hosted a shared wiki on GitHub - anyone with a USB Kill and a GitHub account can contribute to wiki, and help build up the document.
Our ultimate goal is to provide a reference document for manufacturers, testers, and the general public alike to help inform for threat mitigation, or even with choice of which device to purchase.
Head on over to the community and contribute today!