I aways wondered if the communication channel between my wireless keyboard and the usb receiver-antena is secure. I never bother to reseach this. Today I figured out the practical way. I turned on my pc at work and I tried to type the first letter of my password. Nothing hapened. Then I started spamming that letter. Still nothing, until the person next to me said “my keyboard is typing all by itself”. It turns out she has a wireless mouse with a seemigly identical receiver-antena usb.

The moral of the story. If it was so easy to almost leak my password unintentionally due to this flaw of wireless keyboard communication, imagine wad a bad actor can do intentionally. Why try to brute force, social engineer e.t.c. when your password can be stollen in transit from your keyboard to your pc.

  • Kissaki@feddit.de
    link
    fedilink
    English
    arrow-up
    82
    ·
    1 year ago

    Bluetooth data transmission is encrypted. Initialization typically happens only through the press of a physical button.

    I assume you’re using wireless devices of the same manufacturer, that uses an alternative that is not Bluetooth, and has automatic pairing without a safeguard.

    This is not about wireless primarily. Use a decent product and standard and you don’t have that issue.

    • ReversalHatchery@beehaw.org
      link
      fedilink
      arrow-up
      18
      ·
      1 year ago

      Bluetooth isn’t guaranteed to be safe either. It can be safe, with the proper configuration (which depends on the manufacturer, you usually can’t change it), but it can also be very vulnerable

      • Kissaki@feddit.de
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        How so? You mean which encryption is being used? The Bluetooth demanded minimum is not enough?

        • ReversalHatchery@beehaw.org
          link
          fedilink
          arrow-up
          5
          ·
          1 year ago

          Earlier this year i was reading the bluetooth specification (of course not all of it, certain parts only, it’s quite long) and I remember that there are pairing modes which can’t guarantee that the connection is secure, because the method does not make sure that the connection cannot be eavesdropped by an attacker to obtain the keys that’ll be used.
          Of course better devices will already be paired in the factory… but that’s not all of them, and how do you even verify that it has been paired in the factory, or it just randomly pairs with whatever it finds in pairing mode? Or how do you verify that they correctly verify the incoming packets?
          But for the user-pairable ones, the security of the connection depends a lot on what pairing mode will you use, there’s a huge difference if you just press a button and done, or when you can somehow input codes on both devices.

          And it’s not even just about whether you trust your devices to follow the bluetooth specifications correctly. Bluetooth had many different security mechanisms over the years, for the different bluetooth versions, many of which don’t protect against certain types of attacks and situations, or which are just plainly insecure.
          But they still exist and they are still used by some (or more) manufacturers who just don’t care.
          Also keep in mind that for compatibility many Bluetooth devices also support communication with older versioned devices.

          This stackoverflow post tries to summarize a part of the evolution of bluetooth security. Hopefully with it the above will make sense

          But then bluetooth vulnerabilities are also not unkown, both software and hardware based.