Ask Dave Taylor
  • Facebook
  • Instagram
  • Linkedin
  • Pinterest
  • Twitter
  • YouTube
  • Home
  • YouTube Channel
  • Most Popular
  • Newsletter!
  • Ask Me A Question
  • Meet Dave
  • Home
  • Spam, Scams & Security
  • How to Avoid “Juice Jacking” at Public Charging Stations

How to Avoid “Juice Jacking” at Public Charging Stations

May 1, 2023 / Dave Taylor / Spam, Scams & Security / 1 Comment

Both the FBI and the Federal Communications Commission have recently warned people about the dangers of “juice jacking”. It’s having malware installed on your phone by using a public access charging station. Here’s how to avoid it happening to you and an examination of whether it’s actually a real threat or not…

  CLICK TO GET DAVE'S FREE NEWSLETTER! 
Guaranteed to Make you Smarter.

The threat seems scary enough; plug in your precious smartphone into a public charging device and when you pick it up 30 minutes later, all charged up, it also now has malicious apps installed and your private information has all been surreptitiously pulled off the device. The technical term for this is juice jacking and the FBI and FCC have both issued public warnings about the threat.

But is it legit?

When you plug your phone – Android or iPhone – into what’s known as a trusted device, there is a certain amount of information that can flow back and forth on that charging wire. It’s how people do backups, copy photos, and even remote-access apps in some situations. Very helpful. The question then is whether it’s possible to spoof a trusted relationship with an otherwise unknown device and the answer is that it’s not. In fact, smartphone developers are very careful about this sort of access because you can imagine how upset people would be if it were a threat vector.

Even the FCC in its latest warning observes “Although “juice jacking” has been demonstrated to be technically possible as a proof of concept, the FCC is not aware of any confirmed instances of it occurring.” In other words, it’s theoretically possible but it’s never once actually been done in any charging station anywhere in the world.

avoid prevent juice jacking public charging station

Public charging stations certainly seem benign, but that’s because they really are innocuous. The biggest threat you are likely to face is “dirty” power going into your device, but modern devices can handle a wide variety of voltages and, worst case, are more likely to just not charge than to incur any damage to your device.

The concern is if there’s a computer hidden within the charging system that is spoofing a trusted device relationship, but as I’ve already said, that really can’t happen. Nonetheless, it’s smart to understand how your phone also helps you avoid this risk too, so let’s have a look.

TRUSTED DEVICES CONNECTED TO AN IPHONE

Plug your iPhone or iPad into a charging device and it’ll start charging. The white battery icon will turn green and it’ll indicate the current charge state. Easy:

apple iphone ios charging icon battery percentage

Plug it into a computer, however, and you’ll see this pop up:

juice jacking avoid dangerous chargers iphone android - ios trusted device

This is the trusted device prompt and your default response should always be “Don’t Allow“. More importantly, however, if you’ve plugged your phone into what you think is a simple charger and you’re seeing this prompt, then there is something fishy going on and you need to unplug it and find a different source of power. I’ve never seen this happen, but I suppose it’s theoretically possible.

However, note that in the “juice jacking” situation outlined by the FBI & FCC, that’s what you’d actually see with an iPhone, it wouldn’t just silently let the external device access data and add new apps or spyware to the phone. If there’s a sign encouraging customers to “Allow”, then I wouldn’t be plugging my devices in even if they were at 0%.

DETERMINING USB CHARGING ACCESS IN ANDROID

Smartphones running Android are a bit more tricky because you might indeed have your phone set to trust connections so when you think you’re just charging, you’re actually allowing access to your file system. For example, with my Pixel 6 Pro, when I plug it into a previously unknown Windows laptop, it simply indicates that it’s started charging, with no prompt indicating that the connection is more than just power.

Open up the phone and swipe down, however, and notifications reveals the nature of the connection:

juice jacking avoid dangerous chargers iphone android - notification

The prompt “Charging this device via USB” means it’s all good. Tap on the notification anyway, and you’ll go into an area in Settings that’s all about what permissions you grant that USB port on the device when it’s plugged in:

juice jacking avoid dangerous chargers iphone android - plug-in settings usb

Many of these are related to debugging and software development, but generally you want to ensure that you have selected “This device” for the “USB Controlled by” section, and “No data transfer” for the “Use USB for” section, as shown above. Allowing the remote device to control the device is obviously dangerous, though allowing file transfer, USB tethering, MIDI (a musical device interface), and PTP (picture transfer protocol) vary in their risks depending on how you use your phone. Certainly when you’re plugged into an unknown device “No data transfer” is your friend.

THE LONG AND SHORT OF IT

The reality is that while there aren’t any reported instances of actual juice jacking, it is theoretically possible to create what appears to be a benign device charger that can be more malicious depending on your device settings and your ability to be fooled. If it says “Get free games: Just allow “File transfer” in Settings!!” or “Make us a Trusted Device, we’ll download beautiful new landscape photos as your device charges” then run the heck away from that device. At that point it’s dangerous, but one hopes that incredibly few people would be taken in by something of this nature.

I mean, you wouldn’t believe it, would you?

Pro Tip: I have quite a few tutorials and articles on computer basics and security. Please check out my computer basics help library and my spam, scams, and security article repository while you’re visiting. Thanks!

About the Author: Dave Taylor has been involved with the online world since the early days of the Internet. Author of over 20 technical books, he runs the popular AskDaveTaylor.com tech help site. You can also find his gadget reviews on YouTube and chat with him on Twitter as @DaveTaylor.

Let’s Stay In Touch!

Never miss a single article, review or tutorial here on AskDaveTaylor, sign up for my fun weekly newsletter!
Name: 
Your email address:*
Please enter all required fields
Correct invalid entries
No spam, ever. Promise. Powered by FeedBlitz
Please choose a color:
Starbucks coffee cup I do have a lot to say, and questions of my own for that matter, but first I'd like to say thank you, Dave, for all your helpful information by buying you a cup of coffee!
malware, phone security

One comment on “How to Avoid “Juice Jacking” at Public Charging Stations”

  1. Oldster says:
    May 3, 2023 at 6:17 pm

    My laptops all have their own power/charging adapters as do my phone and tablets, so it is unlikely that I’ll ever need to use a charging station (I prefer using my own chargers). With that said, if such a need should ever arise, I’ll first ensure that any tethering is disabled, something I would have done prior to reading this item. I’d also suggest that anyone who connects their phone to a public charging station first ensure that the device is not in developer mode as well (enabling developer mode disables some of the phone’s security features).

    Ernie

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

Recent Posts

  • Share Contact Info Cards Between iPhone and Android?
  • How Do Virtual Private Networks (VPNs) Protect my Privacy?
  • How to Use AI To Identify the Setting of a Photograph
  • What Software Do I Need to Play DVDs on my Windows PC?
  • Is Your Cloud Storage Full? Nope, it’s Spam.

On Our YouTube Channel

Hear Everything with the EKSA Telecom S30 AI-Powered Open Ear Headset

Pump It Up with the Woowind Ventus Pro Portable Air Compressor

Categories

  • AdSense, AdWords, and PPC Help (106)
  • AI and ChatGPT Help (57)
  • Alexa, Kindle, and Nook Help (105)
  • Amazon, eBay, and Online Shopping Help (172)
  • Android Help (296)
  • Apple iPad Help (156)
  • Apple Watch & Smartwatch Help (63)
  • Articles, Tutorials, and Reviews (361)
  • Auto Tech Help (26)
  • Business Advice (202)
  • Chromebook & ChromeOS Help (74)
  • Computer & Internet Basics (834)
  • d) None of the Above (170)
  • Facebook Help (397)
  • Google, Chrome & Gmail Help (215)
  • HTML & Web Page Design (249)
  • Instagram, Bluesky & Threads Help (65)
  • iPhone & iOS Help (692)
  • iPod & MP3 Player Help (173)
  • LinkedIn Help (95)
  • Linux Help (182)
  • Linux Shell Script Programming (93)
  • Mac & MacOS Help (980)
  • Most Popular (16)
  • Outlook & Office 365 Help (49)
  • PayPal Help (69)
  • Pinterest Help (58)
  • Reddit Help (23)
  • SEO & Marketing (83)
  • Spam, Scams & Security (123)
  • Trade Show News & Updates (23)
  • Video Game Tips (66)
  • Web Site Traffic Tips (62)
  • Windows PC Help (1,059)
  • Wordpress Help (207)
  • Writing and Publishing (72)
  • X/Twitter Help (230)
  • YouTube Help (52)
  • YouTube Video Reviews (159)
  • Zoom, Skype & Video Chat Help (75)

Archives

Social Connections:

Ask Dave Taylor


Follow Me on Pinterest
Follow me on Twitter
Follow me on LinkedIn
Follow me on Instagram


AskDaveTaylor on Facebook



microsoft insider mvp


This web site is for the purpose of disseminating information for educational purposes, free of charge, for the benefit of all visitors. We take great care to provide quality information. However, we do not guarantee, and accept no legal liability whatsoever arising from or connected to, the accuracy, reliability, currency or completeness of any material contained on this site or on any linked site. Further, please note that by submitting a question or comment you're agreeing to our terms of service, which are: you relinquish any subsequent rights of ownership to your material by submitting it on this site. Our lawyer says "Thanks for your cooperation."
© 2025 by Dave Taylor. "Ask Dave Taylor®" is a registered trademark of Intuitive Stories, LLC.
FTC Notice: If you buy products through links on this site we may receive a modest affiliate commission. This won’t affect the price you pay.
Privacy Policy - Terms and Conditions - Accessibility Policy - Humix Video Content
  • Home
  • YouTube Channel
  • Most Popular
  • Newsletter!
  • Ask Me A Question
  • Meet Dave