You are viewing a single comment's thread.

view the rest of the comments →

0
3

[–] Kal 0 points 3 points (+3|-0) ago 

so this device can snoop on the transmission between the keyboard and USB dongle.

Ahh, you're talking about a wireless keyboard. I suppose that's plausible if there was a target they wanted to snoop on. They could get within wireless range, which could be tricky.

I don't see how the info could just phone home over the internet, however (which is what I thought you meant.)

Opening a Windows command prompt is the foundation for all our attacks.

Teensy seems to be all about windows from the skimming of the artice I've done.

[–] [deleted] ago 

[Deleted]

0
1

[–] Lopsid [S] 0 points 1 point (+1|-0) ago 

That sounds realistic because with GNU+Linux, no downloaded file is executable unless you set it to be executable. I'm not sure what would happen if you write a program that sets other files as executable. That could be the exception here. But who cares? If you download a virus that sets files as executable, it's not going to run and what kind of idiot is going to write a program that sets downloaded files as executable? I think Windows machines get infected mostly because downloaded files are allowed to run when double-clicked or something.