Hi Alle,

I found this on https://wiki.archlinux.org/index.php/xfce( but analog can
be here as well.. look at )
or

look into the xfce4-session-verbose-log file, there is something wrong with
in( error on mouse/keyboard)


Greetings

Zoltán



2017-08-22 17:22 GMT+02:00 Jape Person <jap...@comcast.net>:

> On 08/22/2017 09:33 AM, Mario Castelán Castro wrote:
>
>> On 21/08/17 23:02, Jape Person wrote:
>>
>>> The keyboard communications are encrypted, and both mouse and keyboard
>>> are rechargeable. But I at least have to check with Cherry support to
>>> learn whether or not my new toys are vulnerable. I suspect that they are.
>>>
>>
>> The problem is that even if the manufacturer assures you that the
>> wireless link is secured cryptographically, all you have is their word
>> for it. The implementation is very probably unauduitable (and even if
>> would not audit it yourself, somebody among the community of users
>> probably would do so and report if he found any vulnerability), as
>> almost all firmware is.
>>
>>
>
> Hence, why I suspect that they are vulnerable. I bought these things
> because my wife trips over her cables 3 or 4 times a day, and wireless ones
> are just easier to deal with from a workstation logistics standpoint.
>
> Dummy that I am, I had only considered the issues like password
> interception, and had never considered the possibility that an unencrypted
> mouse connection would be a path for introducing keystrokes to the system,
> though it's a really obvious attack path. Surely proper design of the
> transceiver could keep the mouse input from sending keystrokes, but then I
> suppose some of the "special features" of the mouse wouldn't work -- and we
> couldn't have that, could we?
>
> I'll look into getting the test suite from Bastille to see if I can figure
> out how to do some testing on these things to see if they look vulnerable.
> Do you really think that this is unauditable? Bastille claims to have
> produced Open Source tools for doing just that.
>
> Maybe I'll just use the wireless keyboards and mice to control TVs.
>
> That is why opaque cryptographic systems can not be trusted. This is
>> covered in any practical cryptography book.
>>
>>
> Practical cryptography -- isn't that an oxymoron, for most users at least?
> People at my lower level of competence are at least aware that cryptography
> can be used in a variety of ways. I implemented encrypted e-mail on my own
> systems years ago, only to find that I couldn't persuade even one other
> among my acquaintances to use it. Not even if I set it up for them. Some of
> these folks were medical professionals who were exchanging the health data
> of patients among themselves and with patients -- by e-mail!
>
> In a day when people post their most personal experiences and thoughts on
> Facebook or Twitter for everyone to read, most people don't seem able to
> comprehend that some of us would prefer not to broadcast our underwear
> preferences to the universe.
>
> Thank you very much for your thoughts. They jerked me a little further
> back into such reality as I can tolerate.
>
> ;-)
>
> JP
>
>

Reply via email to