On Sep 20, 2007, at 11:51 AM, Chris Purves wrote:

On 20/09/2007, Gabriel Parrondo <[EMAIL PROTECTED]> wrote:
El jue, 20-09-2007 a las 10:23 -0600, Chris Purves escribió:

Is it possible to encrypt my wireless keyboard communication? I have a Logitech EX110. The included Windows software has this feature, but
of course no linux drivers.

Rare... how is it connected? Usually this kind of devices are
hardware-only and transparently work as a standard device for the OS.

The Logitech webpage is
http://www.logitech.com/index.cfm/keyboards/keyboard_mice_combos/ devices/154&cl=ca,en#

The normal operation does work transparently.  There is a receiver
that plugs into the ps/2 ports.  Establishing initial connection is
through connect buttons on the receiver and keyboard and mouse.

I ran the included SetPoint software in Windows and it had an option
for enabling encryption between the keyboard and receiver.  Perhaps,
once it is enabled, it will continue to be encrypted when I boot into
Debian.  I don't know if the software turns on a switch in the
hardware, or if it runs some driver that must be running in order to
get encryption.

I've also seen this "enable encryption" option on my wireless keyboard at home.

I think the more important question for the original poster is really -- how far away do you think your keyboard can be reliably received (just walk away from the computer and see where you can go... type things into a text editor like, "Now I'm on the stairs", "Now I'm in the kitchen", "Now I'm on the back porch", and then walk back and see what's on the screen.

I think you'll find that even "good" wireless keyboards won't easily penetrate more than a single wall of your home, and won't extend very far past an exterior wall in most setups, if at all. I can't even put the receiver under the 1 1/2" thick wooden desk on top of the computer without some glitches -- these devices use VERY low RF output... at least the ones I own.

Then do a sane risk-analysis. If I can only reliably use it at X distance, how often will someone I don't trust be able to put a receiver capable of both receiving the data in whatever format it's in? (Keeping in mind that the protocol used for the keyboard usually not well-documented, so it'd take some skill and knowledge to intercept it, or you'd have to disassemble a similar RF unit and reverse engineer a way to make it into a data-logger.) A good exercise might be in TRYING to intercept your own keystrokes, and seeing how difficult it is for YOU to do it. If it's a pain in the ass for you, then evaluate whether or not you're doing something so bad or have such a need for privacy that you can name anyone or any organization that would go to that effort to read your typing.

If you can think of someone/something who'd want that data bad enough to get close enough, and do the work of figuring out how to capture it -- wireless keyboards probably weren't a good idea for you in the first place.

Security is as much about realistic risk-analysis as it is about "encryption for encryption's sake". I'm not saying you shouldn't TRY to encrypt your keyboard traffic if the keyboard has the feature -- but at some point there's a steep diminshing return on "security".

Another thing to look at... are there easier ways you'd leak whatever it is that you're typing on your keyboard that someone smart would go after before trying to snoop your keyboard? Could it be gathered any other electronic/technical way? Could you fall for a social engineering "hack" easier and GIVE away what you're doing on that keyboard to someone you "thought you could trust"? I bet there are ways that would have a much lower opportunity-cost lost to the attacker than trying to get your keystrokes from your wireless keyboard.

If you're using a wireless keyboard out in public... that's a completely different story. Again, wireless may not be the correct technical solution for you.. :-)

--
Nate Duehr
[EMAIL PROTECTED]



Reply via email to