Last week, two hackers announced they had the BadUSB code reverse engineering, and on GitHub published. As for the reason for this, is to give the industry the pressure is applied, in order to quickly come up with a solution--although doing so will also make the user more vulnerable to face attacks. Although you want to completely“fix”this vulnerability is still very difficult, but they also came up with a special approach-although the procedure is a little complicated.
Hackers recommend using Gorilla brand epoxy resin(epoxy)to manually override the U disk of the PIN(other hard material may also be an alternative), but doing so can easily lead to hardware damage(if someone tried to hang off the coating).
In addition to the above the balls of the method, the two also released a“patch”to disable some of the USB device in the boot mode. Thus, the Black may be more difficult to succeed.
Unfortunately, this patch only applies to the latest version of the group with(Phison)USB 3.0 firmware.