TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Logitech keyboards and mice vulnerable to extensive cyber attacks

43 点作者 jhoh将近 6 年前

4 条评论

rasz将近 6 年前
&gt; CVE-2019-13053, an attacker can inject any keyboard input into the encrypted radio traffic of the Unifying keyboards without knowing the crypto key used. To do this, the attacker only needs to have temporary access to the keyboard in order to press some keys.<p>or you know, ask the nice bank lady to type this &quot;magic key combination&quot; for you. Yes darling my name is little bobby tables.<p>&gt;CVE-2019-13052 is not being addressed either. The attacker can decrypt the encrypted communication between the input devices if he has recorded the pairing process.<p>Oh dear, did the keyboard I am currently jamming stopped working? I have same model! my son&#x2F;nephew told me you need to pair them. Ill just sit here patiently while you do that.
评论 #20404112 未加载
评论 #20384875 未加载
Sahhaese将近 6 年前
This is actually interesting from the perspective of fairness in e-sports. It&#x27;s been rumoured that professional players could &quot;cheat on LAN&quot; by side-loading cheat software through modified hardware supplying custom &#x27;drivers&#x27;.<p>If the hardware itself has vulnerabilities it could be used to mask the cheat loading and make it harder for the host PCs to detect if any of that side-loading is happening.
tatersolid将近 6 年前
Anybody know of secure alternatives?<p>It seems these wireless keyboards are all made as cheaply as possible. Microsoft advertises &quot;AES security&quot; for their wireless keyboards and mice, with a pre-paried USB dongle. But since they run on 27 MHz via a custom USB dongle I assume it&#x27;s a proprietary protocol (and therefore likely quite insecure). Bluetooth might be a bit better but still has limited range for conference-room use.
评论 #20404140 未加载
blinky1456将近 6 年前
Requiring physical access to the keyboard by the attacker first, makes this less impactful.<p>With physical access the they keyboard&#x2F;computer, they could plant any other number of devices&#x2F;bugs or extract information.
评论 #20381021 未加载
评论 #20381087 未加载