or

apt-get install xfce4-goodies


2017-08-22 18:11 GMT+02:00 Zoltán Herman <zoltan...@gmail.com>:

> Hi Alle,
>
> I found this on https://wiki.archlinux.org/index.php/xfce( but analog can
> be here as well.. look at )
> or
>
> look into the xfce4-session-verbose-log file, there is something wrong
> with in( error on mouse/keyboard)
>
>
> Greetings
>
> Zoltán
>
>
>
> 2017-08-22 17:22 GMT+02:00 Jape Person <jap...@comcast.net>:
>
>> On 08/22/2017 09:33 AM, Mario Castelán Castro wrote:
>>
>>> On 21/08/17 23:02, Jape Person wrote:
>>>
>>>> The keyboard communications are encrypted, and both mouse and keyboard
>>>> are rechargeable. But I at least have to check with Cherry support to
>>>> learn whether or not my new toys are vulnerable. I suspect that they
>>>> are.
>>>>
>>>
>>> The problem is that even if the manufacturer assures you that the
>>> wireless link is secured cryptographically, all you have is their word
>>> for it. The implementation is very probably unauduitable (and even if
>>> would not audit it yourself, somebody among the community of users
>>> probably would do so and report if he found any vulnerability), as
>>> almost all firmware is.
>>>
>>>
>>
>> Hence, why I suspect that they are vulnerable. I bought these things
>> because my wife trips over her cables 3 or 4 times a day, and wireless ones
>> are just easier to deal with from a workstation logistics standpoint.
>>
>> Dummy that I am, I had only considered the issues like password
>> interception, and had never considered the possibility that an unencrypted
>> mouse connection would be a path for introducing keystrokes to the system,
>> though it's a really obvious attack path. Surely proper design of the
>> transceiver could keep the mouse input from sending keystrokes, but then I
>> suppose some of the "special features" of the mouse wouldn't work -- and we
>> couldn't have that, could we?
>>
>> I'll look into getting the test suite from Bastille to see if I can
>> figure out how to do some testing on these things to see if they look
>> vulnerable. Do you really think that this is unauditable? Bastille claims
>> to have produced Open Source tools for doing just that.
>>
>> Maybe I'll just use the wireless keyboards and mice to control TVs.
>>
>> That is why opaque cryptographic systems can not be trusted. This is
>>> covered in any practical cryptography book.
>>>
>>>
>> Practical cryptography -- isn't that an oxymoron, for most users at
>> least? People at my lower level of competence are at least aware that
>> cryptography can be used in a variety of ways. I implemented encrypted
>> e-mail on my own systems years ago, only to find that I couldn't persuade
>> even one other among my acquaintances to use it. Not even if I set it up
>> for them. Some of these folks were medical professionals who were
>> exchanging the health data of patients among themselves and with patients
>> -- by e-mail!
>>
>> In a day when people post their most personal experiences and thoughts on
>> Facebook or Twitter for everyone to read, most people don't seem able to
>> comprehend that some of us would prefer not to broadcast our underwear
>> preferences to the universe.
>>
>> Thank you very much for your thoughts. They jerked me a little further
>> back into such reality as I can tolerate.
>>
>> ;-)
>>
>> JP
>>
>>
>

Reply via email to