never use wireless keyboards

D69

Dagobah Resident
Here is an example video of how wireless keyboards traffic can be decrypted from a distance.

_http://www.remote-exploit.org/Keykeriki.html

This security flaw is well know for nearly a year but tool to automate an attack has been released just recently.

If someone is interested in details then here you go:

_http://www.remote-exploit.org/advisories/27_Mhz_keyboard_insecurities.pdf
 
Back
Top Bottom