Protect Your Linux Desktop From Malicious USB Devices

Brodie Robertson · Intermediate ·🔐 Cybersecurity ·3w ago
You should never pick up and plug random USB devices into your system, but sometimes you can't control what other do to your system and you want to make sure that no one ever plugs in a BadUSB ==========Support The Channel========== ► Patreon: https://brodierobertson.xyz/patreon ► Paypal: https://brodierobertson.xyz/paypal ► Liberapay: https://brodierobertson.xyz/liberapay ► Amazon USA: https://brodierobertson.xyz/amazonusa ==========Resources========== Kernel Patch: https://lore.kernel.org/lkml/20260404133746.80914-1-zybo1000@gmail.com USB Guard Website: https://usbguard.github.io/ Arch Wiki USB Guard: https://wiki.archlinux.org/title/USBGuard USBKill: https://github.com/fabiogermann/usbkill Silk Guardian: https://github.com/kmille/silk-guardian =========Video Platforms========== 🎥 React: https://www.youtube.com/@BrodieRobertsonReacts 🎥 Podcast: https://techovertea.xyz/youtube 🎮 Gaming: https://brodierobertson.xyz/gaming ==========Social Media========== 🎤 Discord: https://brodierobertson.xyz/discord 🐦 Twitter: https://brodierobertson.xyz/twitter 🌐 Mastodon: https://brodierobertson.xyz/mastodon 🖥️ GitHub: https://brodierobertson.xyz/github ==========Credits========== 🎨 Channel Art: Profile Picture: https://www.instagram.com/supercozman_draws/ #USB #Linux #LinuxKernel #OpenSource #FOSS 🎵 Ending music Track: Debris & Jonth - Game Time [NCS Release] Music provided by NoCopyrightSounds. Watch: https://www.youtube.com/watch?v=yDTvvOTie0w Free Download / Stream: http://ncs.io/GameTime DISCLOSURE: Wherever possible I use referral links, which means if you click one of the links in this video or description and make a purchase I may receive a small commission or other compensation.
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

The Biggest Cybersecurity Story of 2026? TeamPCP Claims Massive GitHub Breach
GitHub confirms major internal security breach in 2026, potentially the biggest cybersecurity story of the year
Medium · Cybersecurity
Nmap Series: Nmap Post Port Scans — Part 4.
Learn to leverage Nmap for post port scans to identify services and OS, a crucial skill for cybersecurity professionals
Medium · Cybersecurity
How to Map Out Your Digital Footprint Before Attackers Do in 2026
Learn to map your digital footprint to protect against cyber threats by using open-source intelligence techniques
Medium · Cybersecurity
The Most Dangerous Kind of Information
A single, obvious statement can collapse a system of minds due to the meta-cognition trap, highlighting the importance of critical thinking in cybersecurity
Medium · Cybersecurity
Up next
Your AWS IAM Starter Checklist
AWS Developers
Watch →