TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Eavesdropping on a wireless keyboard (2013)

96 pointsby truciousabout 11 years ago

6 comments

3stripeabout 11 years ago
Reminds me of an episode of Due South (the tv series about a Canadian mountie working as a detective in Chicago) in which he correctly works out a password from just the sound of someone typing it.<p>Turns out this is not so far-fetched after all:<p>&quot;If you have an audio recording of somebody typing on an ordinary computer keyboard for fifteen minutes or so, you can figure out everything they typed.&quot;<p><a href="https://freedom-to-tinker.com/blog/felten/acoustic-snooping-typed-information/" rel="nofollow">https:&#x2F;&#x2F;freedom-to-tinker.com&#x2F;blog&#x2F;felten&#x2F;acoustic-snooping-...</a>
评论 #7616700 未加载
kabdibabout 11 years ago
The problem is that the company who&#x27;s saying &quot;Trust us, we have 128 bit encryption in our product&quot; isn&#x27;t giving you enough information to make an informed decision about how secure the device really is.<p>Choosing a keyboard because the box says &quot;128 bit encryption&quot; doesn&#x27;t help if the manufacturer bakes in the same key on every device. Or a predictable key. Or really, any static session key even if it varies by device serial number or something like that. And a marketing or advertising guy doesn&#x27;t know this, they just see a checkbox they can stick on the artwork. &quot;Just get that 128 bit stuff in there so we aren&#x27;t lying&quot; is the most likely scenario for something like a keyboard, where competition is tough and margins are wafer thin.<p>Personally I&#x27;d use copper if I was at all worried, because the likelihood of some random firmware engineer getting a security protocol right is pretty slim.
dan_bkabout 11 years ago
&gt; Some time ago, I needed to find a new wireless keyboard. With the level of digital paranoia that I have, my main priority was security.<p>If <i>my main priority was security</i>, then I would never even think about wireless (network, keyboard, etc.).
评论 #7618495 未加载
csmattryderabout 11 years ago
So how far can you go and still eavesdrop on the signal? I haven&#x27;t the first clue regarding signals, but I guess you&#x27;d have to plant a bug on the underside of the desk as opposed to a radar dish on the other side of the wall?<p>But yeah, another post from windytan that&#x27;s left me amazed. If you&#x27;re uninitiated, this is the same woman that figured out how to read from bus timetable display radio signals [1].<p>I&#x27;ll stick to my USB wired keyboard for now, though, until encrypted wireless keyboards come down from £70-100.<p>[1]: <a href="http://www.windytan.com/2013/11/decoding-radio-controlled-bus-stop.html" rel="nofollow">http:&#x2F;&#x2F;www.windytan.com&#x2F;2013&#x2F;11&#x2F;decoding-radio-controlled-bu...</a>
评论 #7616554 未加载
higherpurposeabout 11 years ago
This is why Apple&#x27;s iBeacon was <i>never</i> going to be a viable method of payment, unlike NFC. The range on Bluetooth is just too long to safely do something like payments with it.
评论 #7616827 未加载
aoxfordcaabout 11 years ago
If you don&#x27;t have consent, this would be one of the RARE instances of a Title I violation under the ECPA.