[–] [deleted] 1 point 0 points (+1|-1) ago  (edited ago)

[Deleted]

2
0

[–] 2716057 2 points 0 points (+2|-2) ago 

It makes perfect sense. The Teensy injects itself between your Microsoft-branded keyboard, and its USB dongle. It doesn't matter if the dongle is connected to a MacBook, Linux machine, or Windows machine.

This is why the firmware you're running on your computer is irrelevant. It's the firmware that's on your wireless keyboard that makes a difference.

[–] [deleted] 1 point 0 points (+1|-1) ago 

[Deleted]

0
3

[–] Kal 0 points 3 points (+3|-0) ago 

so this device can snoop on the transmission between the keyboard and USB dongle.

Ahh, you're talking about a wireless keyboard. I suppose that's plausible if there was a target they wanted to snoop on. They could get within wireless range, which could be tricky.

I don't see how the info could just phone home over the internet, however (which is what I thought you meant.)

Opening a Windows command prompt is the foundation for all our attacks.

Teensy seems to be all about windows from the skimming of the artice I've done.

[–] [deleted] ago 

[Deleted]

0
1

[–] Lopsid [S] 0 points 1 point (+1|-0) ago 

That sounds realistic because with GNU+Linux, no downloaded file is executable unless you set it to be executable. I'm not sure what would happen if you write a program that sets other files as executable. That could be the exception here. But who cares? If you download a virus that sets files as executable, it's not going to run and what kind of idiot is going to write a program that sets downloaded files as executable? I think Windows machines get infected mostly because downloaded files are allowed to run when double-clicked or something.