What is a Data Blocker: Should you have one?
We have all charged our phones in a public space such as an airport or cafe, and decided to use the plug or USB Port available on the wall. However, it is crucial to acknowledge that this charge comes at a risk to your own data. Data Blockers are a small gadget designed to keep your devices and your personal information safe from juice jacking while charging on the go. But, how does it work?

What is Juice Jacking?
When you decide to connect your phone to a public USB port, e.g. a cafe, airport, hotel or even rental cars, you are at risk of opening a data connection between you and malicious data. Hackers infect USB ports or charging cables in public places, so once your phone is connected and charging, attackers can upload malware to your device, initiate data transfers, and even fully lock you out of it.
Different types of Juice Jacking:
- Data Theft - as soon as you plug your device into a compromised USB port, the malware in the port allows hackers to access your data, such as your contacts, photos, messages and passwords, without you even knowing.
- Malware Installation - Attackers can escalate by installing software on your device without your knowledge. This malware can allow them to track your keystrokes, spy on your activity, or even provide them with remote access to your phone, even after you've disconnected from the charger.
- Device Lockout - In some instances, juice jacking has led to ransomware attacks, with hackers locking you completely out of your device and demanding payment to restore access.
- Configuration Attacks - This is a more advanced form of juice jacking that alters your device's configuration or installs malicious profiles, allowing the attacker to maintain ongoing control or silently collect future data transfers.
How Data Blockers Protect You?
A USB Data Blocker acts as a hardware firewall for your USB connection. This means that even if a public USB port has been tampered with, the datablocker completely isolates you from any malicious software or data exchanges, so the malware cannot communicate with your device's operating system.
How it works:
- Connects only the power pins VBUS and GND, allowing your phone to charge
- Disconnects the data pins D+ and D-, preventing data exchange between your device and the charging port.

Do You Really Need One?
We especially recommend USB Blockers to regular travellers, professionals and government officials who are especially at risk, as a single compromised charging port could spread malware, steal files and expose sensitive information. If you charge your phone in public places, data blockers are perfect to keep your data safe.
While the risk of being "juice jacked" is low, this type of attack is becoming increasingly common, with the nature of this attack being relatively simple for hackers. Therefore, a data blocker can prevent all risks of this.
Other Ways to Protect Yourself!
1) Plug Into Power, Not Data
If possible, do not use public USB ports at all. Instead, bring your own plug or adapter if travelling and use it directly on a wall outlet. This is because Standard AC outlets only provide electricity, unlike USB ports, which can transfer data.
2) Always Use Your Own Cable.
Malicious cables are indistinguishable from genuine ones but can secretly install malware. Make sure to always keep a charging cable in your bag to stay safe.
3) Carry a Power Bank
This is the easiest way to avoid public charging ports altogether. When travelling, make sure to bring a fully charged power bank with you. Not only does this save you time in finding a charging port, but it also ensures you are at no risk of any malware.
4) Use a VPN
You are even at risk of losing your data when you connect to an unsecured WIFI network. When using Public WIFI in places such as airports, hotels and cafes, the networks often lack proper encryption, meaning hackers on the same network can potentially intercept the information you send and receive on it. As a result, we recommend always using a Virtual Private Network (VPN) if you have to use these networks. VPNs work by encrypting your internet traffic through a secure private server, hiding your IP address to make it almost impossible for anyone to see what you're doing.