Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

Re: Microsoft wireless keyboard hacked from 50 metres

____/ Mark Kent on Friday 07 December 2007 15:10 : \____

> Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx> espoused:
>> ____/ nessuno@xxxxxxxxxxxxxxxxxxx on Thursday 06 December 2007 23:49 : \____
>> 
>>> Microsoft's director of security response, Mark Miller, said the
>>> company was investigating Dreamlab's claims. He said Microsoft was
>>> unaware of any attacks exploiting the claimed vulnerability or any
>>> customer impact.
>> 
>> My supervisor has some keyboards just like that and another 'vulnerability'
>> these have is setup difficulty. At some stage I think he spent hours just
>> trying to get this to work (despite prior experience). I can't recall if he
>> reached out for the IT staff at the end, but this was somehow resolved. They
>> say that Microsoft has a notoriety when it comes to making its own products
>> compatible with one another (examples: Zune-Vista, IE7-Frontpage).
>> 
>> Windows -- when you can spare time tinkering with point and click menus that
>> do nothing and aren't verbose enough to say what's wrong...
>> 
> 
> The same issue applies to British Passports with the SSID chip in them.
> Criminals will be able to scan you in crowds with the greatest of ease,
> the things are a huge risk to personal safety.

Phones: 

Cryptome: NSA has access to Windows Mobile smartphones

http://blogs.securiteam.com/index.php/archives/1028

Hardware:

Chip Design Flaw Could Subvert Encryption

http://www.crm-daily.com/story.xhtml?story_id=11200BH5USIO

Operating systems/PC:

How NSA access was built into Windows

http://www.heise.de/tp/r4/artikel/5/5263/1.html

Networks:

Did NSA Put a Secret Backdoor in New Encryption Standard?

http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115

Many more references exist, so that's just a short take. Today's computing
equipment seems to be broken by design. Lack of transparency enables this.
Digital slavery via DRM and related technologies; Digital surveillance via
weak protocols.

You know, if you were to point it out to some companies/authorities, they would
fail (or refuse) to even see anything /wrong/ with this.

-- 
                ~~ Best of wishes

Roy S. Schestowitz      | How I learned to stop worrying and love GNU/Linux
http://Schestowitz.com  | Free as in Free Beer |  PGP-Key: 0x74572E8E
Cpu(s): 27.4%us,  4.4%sy,  1.0%ni, 62.4%id,  4.4%wa,  0.3%hi,  0.2%si,  0.0%st
      http://iuron.com - semantic engine to gather information

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index