D69
Dagobah Resident
Here is an example video of how wireless keyboards traffic can be decrypted from a distance.
_http://www.remote-exploit.org/Keykeriki.html
This security flaw is well know for nearly a year but tool to automate an attack has been released just recently.
If someone is interested in details then here you go:
_http://www.remote-exploit.org/advisories/27_Mhz_keyboard_insecurities.pdf
_http://www.remote-exploit.org/Keykeriki.html
This security flaw is well know for nearly a year but tool to automate an attack has been released just recently.
If someone is interested in details then here you go:
_http://www.remote-exploit.org/advisories/27_Mhz_keyboard_insecurities.pdf