Your laptop should reject USB-C accessories which are not suitable, the USB-IF proposes a new specification

The adoption of the standard USB Type-C is in full swing, it is becoming easier to find devices, also in accessories. There are many advantages in this new type of connectors, since they are reversible, so they can carry more energy devices, going through a higher data transfer rates, which make them suitable even for work with video streams.

USB-C accessories

Image Source: Google Image

So far so good, but not all cables and chargers are being created in the same way and it is good to be informed of what you buy : some do not meet the full specification that has been put on the table, and can reach create problems gadgets that are using them.

Actually this is like everything, there are qualities and specifications to meet, and more than a specific problem USB Type-C is to know well what we have at hand. But the people behind this standard are putting solutions from the point of view of those who want to do things right, also for those who neither have nor want to have as much knowledge.

THE GOOD NEWS IS THEY ARE PUTTING SOLUTIONS, THE BAD NEWS IS THAT THIS DOES NOT SOLVE THAT HAS POORLY DESIGNED CABLES AND CHARGERS

The USB-IF has thought of a new specification that works authentication elements to be connected, and has just been announced at the Intel Developer Forum in Shenzhen, China.

You may also like to read another article on iMindsoft: CUBE iWork12: Chinese hybrid with Windows 10 and Android 5.1

What they have done is to propose a communication protocol between devices and accessories, a process that will occur before including a transfer of information has or electricity. If you are trying to connect something to a ‘host’ element – such as a computer – that does not meet the latest specification, the system will not let the elements be fried.

The verification of the accessories that connect to your computer or mobile raised by the USB-IF is transmitted using 128-bit encryption, and as mentioned before, nothing will be transmitted until you agree.

The new protocol is designed to negotiate connections with elements that need not be ‘smart’, and transmit data not only load. Said security system also prevents the introduction of malware, viruses or exploits.

There is a part that I am not very clear about this story, and when our computers or phones can assimilate this new specification. We suggest that with firmware and software will be possible to update the gadgets. Another thing is the cables and adapters that are designed in a way and cannot be touched.

Leave a Reply

Your email address will not be published. Required fields are marked *