Just found this article which lists two of the models I linked to above.
What do you think?
Only one of the hacks mentioned in that article was of the encrypted keyboard itself and that was done WITHOUT physical access to the keyboard it sounds like. The one was mouse based for mice that were not encrypted. The other seemed to require physical access to the keyboard.
The one that did "attack" the encrypted keyboard while not having physical access seemed quite involved and I am not sure how easy it would be to implement with out eyes on the computer (i.e. how do you know which part of the "recording" was the part that included unlocking the computer sight unseen...it may not matter, of course, as you could play the whole recording, but not sure whether that might complicate then using the mouse attack vector as was described as needing to do AFTER unlocking the computer).
In other words, it seems like a proof of concept, but not really sure how practical of an attack vector it really is. Seems like an awful lot of work to then use to try to attack some consumer in a house with maybe iffy results (i.e. does the consumer have a wireless keyboard with an unencrypted wireless mouse? and what do you gain by attacking that particular consumer?). In general, I believe these types of attacks are more likely to be perpetrated against a business than a consumer sitting at home. So, if you sitting at home and debating whether or not to use a wireless keyboard that uses encryption, I likely would not stress to much over it. Of course, if you do stress about it, then the easy solution is just to use a wired keyboard.
I only have one wireless keyboard that is used with an old computer that is turned off 99% of the time. Makes it easier to use on the few occasions that I boot it up. So, if some crook wants to sit around in a car somewhere outside my house for months at a time just for the few occasions I boot up that computer, then more power too them. Of course, there are likely way easier targets for them to go after than wasting time waiting for me to boot up my one old computer that uses a wireless keyboard. And of course, many crooks will always pick the softer targets. It is kind of like the old says of "I don't need to out run the bear, just the other guy". So, don't be the slower guy, aka the softer target and your odds are pretty good (not completely fool proof, but pretty good).
Edited by smax013, 04 June 2017 - 09:20 PM.