from the charged-with-computer-fraud dept.
mask.of.sanity writes "Data can be stolen from Windows, Android and Apple devices by unassuming power charging towers. In an attack demonstrated at the Defcon hacking conference, mobile phone charging units were rigged to pull data from phones plugged into them. Researchers found many jailbroken and modified devices activated USB functions when they were plugged in, or simply rebooted."
Real Programs don't use shared text. Otherwise, how can they use functions
for scratch space after they are finished calling them?