Linux machines have not been tested.
Fullers spoof attack method works because most PCs will automatically take a stab at install Plug-and-Play USB devices.
The researcher tested out the attack using two products, theUSB Armoryand aHak5 Turtle.
For Fullers spoof attack to work, the hacker has to have physical access to the PCs.
source: www.techworm.net