It seems the Indian policymakers are about to enforce USB-C connectors on all smartphones and laptops. According to a report from Livemint, smartphone manufacturers will be required to comply by June 2025, while laptops will be required to have USB-C connectors for charging by the end of 2026.
India’s decision to make USB-C ports compulsory comes just after the EU’s enforcement, which is in effect starting this year. It aims to trim down e-waste since all devices will work with the same charging cables and potentially make things a bit less complicated for users.
Also Read: Apple Could Delay Its AI Features In EU Due To Big Tech Law
New Mandate Will Reduce Cost For Manufacturers
This new mandate will help manufacturers reduce the cost, as they won’t have to make a number of different chargers and cables. The new rule captures a broader market, not just Android and iOS smartphones and tablets, but Windows and Mac devices as well.
However, the new law will not be applicable to small accessories such as fitness bands, smartwatches, and earbuds, and it also does not apply to dumbphones.
Although there’s no official statement from the Indian Union IT ministry, policymakers will probably announce the regulation very soon. People close to the matter claim the government has already talked to some of the big names in the industry and they seem to be on board with the decision.
Also Read: Former OpenAI Chief Scientist Starting New AI Firm
Indian Govt. Issues Warning For Apple Vision Pro Users
The Indian Computer Emergency Response Team (CERT-In) has issued a high-severity warning regarding multiple vulnerabilities found in Apple Vision Pro. This device works on the newly developed VisionOS and is susceptible to severe security breaches that could let malicious actors take control of the system, access confidential user information, and cause significant disruptions.
This advisory highlights that these vulnerabilities could be exploited in a number of ways, putting users at risk. One of the critical flaws enables attackers to execute arbitrary code with kernel-level privileges. This will allow hackers to access the system, bypassing most built-in security mechanisms, hence letting them install malicious software or change system settings without detection.
Another big concern is the instability it brings to apps, which might close unexpectedly. This disruption can affect the user experience and potentially result in loss of data. Moreover, the vulnerabilities allow bypassing kernel memory protections, a critical issue as this memory is important for maintaining system stability and security. Attackers can get deeper access to the system by exploiting this flaw, allowing them to take out undetected malicious activities.