[–] tame 0 points 19 points 19 points (+19|-0) ago
USB devices are a massive infection vector. There've been all sorts of hijinks like sending people promotional freebie mice which also present as keyboards and run keboard commands when plugged in.
Take a look at these things: https://www.offensive-security.com/offsec/advanced-teensy-penetration-testing-payloads/
Basically if someone wants to get onto your system and is skilled enough, you won't stop them.
[–] Kal 3 points 5 points 8 points (+8|-3) ago (edited ago)
The Teensy would target Windows machines only.
This is sort of what I figured. How is Linux going to give a fuck about anything a keyboard wants to do besides input keystrokes? M$ will probably play ball for what the NSA wants devices to do, but to my knowledge, open source doesn't give two shits about all these issues you guys on windows are concerned with.
Thats not at all how it works. If it reads as a generic usb device then it doesnt matter what operating system the host operating system uses, all commands will be passed and executed as though they're coming from a legitimate user typing away on the keyboard.
And as for the Teensy itself, its pretty much the defacto standard for home brew keyboards and game controllers because there are several fully functional open source firmware packages available for it. It also works on all operating systems.
As for injecting data, all you have to do is spoof the real keyboard and the os doesnt even realize theres a second transmitter.
[–] 2716057 1 point 7 points 8 points (+8|-1) ago
This is not what they mean. Microsoft-branded keyboards and mice all use the same (lack of) encryption, so this device can snoop on the transmission between the keyboard and USB dongle.
The firmware you're using on your computer (Linux, OSX, BSD, etc.) is irrelevant. You could use a Microsoft keyboard on a Linux machine, and the Teensy would still pick it up.
[–] carlinco 0 points 7 points 7 points (+7|-0) ago
TBH, true security would only be possible if people started producing their own computers (and equipment to make them). Kind of like open source software, but with advanced 3d-printing.
But even then, it would not be difficult to fool someone by replacing an item with one that looks exactly the same, or by injecting something into the blueprints which would be hard to find (see how often this happens even to open source software under public scrutiny).
As it is, be vigilant, punish companies that get caught breaching your privacy by purchasing somewhere else, and take apart the stuff you quit using to find out at least after the fact if anyone is onto your secret stash of bitcoins...