
KeyGhost Security Keyboard Records Keystrokes 133
Let's say you work in a shared office environment and want to prevent someone from eavesdropping on your computer use. You take the logical precautions: you have a lock on your floppy drive, you set a password in the BIOS, you encrypt your files, and you use only secure protocols for remote interaction. Odds are still low that you have a shroud or other physical impediment preventing access to your keyboard's PS/2 port, right?
Interestingly, the KeyGhost is also available in a Microsoft Natural model, so it might be inconspicous in many settings that a new standard keyboard might stick out in. So now you have more reason than plain cynicism to wonder at an "upgrade" to your regular keyboard at work. Of course, most programmers have settled on their keyboards after long trial, and would never disregard such a switch.
Despite the obvious unscrupulous uses this keyboard could be put to, I can think of one that isn't: I'd like to see one of these drawing its power from a battery pack instead of the PS/2 port and featuring a tiny LCD display, for times when it'd be nicer to type an e-mail out on the porch than inside, or as a more efficient idea-gobbler than a pen-driven PDA.
Re:direct physical == no security (Score:1)
Re:What to do, what to do.... && keyboards (Score:1)
k@a@i@n@@k@a@i@n@.@o@r@g@
Oops! /. stripped my article. TRY TWO (Score:1)
things in word processors/text editors people
are likely to use to try to view your keystrokes
in...
:q!<ENTER>rm -rf
<ALT-F4><TAB><ENTER><Win-R>command<ENTER>del \CONFIG.SYS<ENTER>
<CTR><ALT><DEL>
<STOP-A>
<CMD-CMD-~>
:) (of course, make sure that these don't have
hazardous effects while you type them)
give me a billion of these and a billion moneys... (Score:1)
This way, you only need a few computers to siphon through the monekey`s input (via dumping full keyboard buffers) to sift for any random examples of brilliance...
or hamlet.
They found a new use for Iridium! (Score:1)
Re:Cryptonomicon & Van Eck phrea(c)king (Score:1)
CT: We need a (-1, Spoiler).
Re:What to do, what to do.... (Score:1)
What we need now is a device that can emulate the pressing of a useless keyboard character -- one that won't affect program operation, but can fill up the logfiles with a few hundred of these chars every second. All it will take is a coffee break to clear any logs.
--
Solution: (Score:1)
--
Why put it on the keyboard? (Score:1)
A couple of ears back, I actually made something that basically did just that (well, similar). It was basically just some simple circuitry to plug a keyboard into a parallel port. And I'm not exactly an electronics genius.
The only flaw then would be that you'd be hard pressed to get any dirt on hardcore geeks like us; we spend too much time fiddling around with cables to let it go unnoticed.
Re:This has been done!! (Score:1)
I can get a very cheap computer by just adding $100, I don't understand what the point of these would be if you don't make it very cheap.
$50 : LCD
$10 : Keyboard (PS/2)
$30 : Memory
Detection, probably a child play (Score:1)
But put a little customized Bluetooth [bluetooth.net] chip (no broadcasting) in that one and you have a nonconspicious way of downloading data. And it wouldn't be detectable from the computer. /emj
Won't catch me! (Score:1)
--
It's a fine line between trolling and karma-whoring... and I think you just crossed it.
- Sean
Biometrics have their problems, too (Score:1)
A line I've heard more then once in movies and on TV: "I assume your hand print will work equally well whether you are alive or dead?"
Re:Another use (Score:1)
Delicon
Re:Yeesh. I'm gonna carry my own keyboard with me. (Score:1)
What about remaping? (Score:1)
--
Cryptonomicon & Van Eck phrea(c)king (Score:1)
Cryptonomicon was given his laptop back while
in jail due to a setup. They spied on the EMF
emissions of his computer to catch him decrypting
some files in the laptop.
In spite of that, he managed to create a covert
channel between himself and the computer using
the space bar and the keyboard LEDs to communicate
in Morse code.
Something similar could be done to bypass a keyboard sniffer, perhaps?
Y.
Combined text and graphics (Score:1)
A cheesy graphic of a keyboard appears, with Microsoft clipart around the edges, and a pair of badly animated mice hopping down the sides and slowly creeping along the bottom.
You painstakingly hunt and peck a seventeen-letter alphanumeric password (that you just pulled out of your wazoo) on the on-screen keyboard while loudly sneering "That'll show them keyboard sniffers!" in the general direction of where you think the hidden mike is, while feebly trying to block the hidden camera from seeing the monitor.
Meanwhile, you're hitting the space bar (or x or the Any Key) when the little mouse hops down to the row containing the first character of your password, and hitting Enter (or c or Shift+Any) when the other little mouse creeps under the right column. A monitor tape would have no clue, and the keyboard sniffer would only get the same meaningless series of strokes, which you could further mess up by having the mice go out of bounds for a few seconds, during which you could type in garbage. When you're all done, you point and click the Enter key on the monitor.
You can even defeat a combined/synchronized keyboard/monitor videotape by Velcroing a detached number pad to the underside of your desk, and bumping it with your knee (or heck, fingers) with or without using the Shift on your keyboard.
For the full effect, though, you should stick two sticky notes to the bottom of your monitor: one should contain the alphabet from A-M, with N-Z written underneath them backwards, and the second should contain an encrypted password, which, with the aid of the other sticky note, a 133t hax0r could decrypt to read "Natalie Portman pours hot grits down snoopers' pants."
Re:Keyboard Monitoring (Score:1)
Portable battery powered keyboard (Score:1)
Somebody already makes a keyboard like this. It's called the Alphasmart [alphasmart.com]. It's pretty expensive [alphasmart.com], but if you really want to be able to take your keyboard with you, the option is there. It even has a Dvorak option for those of us who use the superior layout :)
-Linknoid
Re:Biometrics have their problems, too (Score:1)
Could you interigate this from afar? (Score:1)
Later...
Re:Interesting... (Score:1)
Read the article dude. They make those too.
Re:LCD and battery is a good idea. (Score:1)
1. Keyboard for the main console of servers and minis. No more wondering who did what when. (Please add a timestamp feature to this product)
2. Keyboard for programmers and regression testers "how did THAT happen?"
3. Keyboard for employees who have been written up for computer misuse.
4. Banks and other high security uses. Bet you see a lot of sales for apps that handle money.
5. My kids PC. (parents do have eyes in the back of their heads) Potentially the big money maker.
Need I go on?
Re:Interesting... (Score:1)
Re:*Legit* Uses (Score:1)
To elaborate, have you ever used a feature-rich program like Emacs? Have you ever had the experience of hitting Ctrl-X-Ctrl-B by accident and going, "Wow, how did I do that?"
This functionality exists in Emacs: C-h l, view-lossage.
Keyboard Device would be better for spying! (Score:1)
Re:they cant do this (Score:1)
*Legit* Uses (Score:1)
I don't know about you but I frequently find myself wanting to be able to track my steps back to the moment just before I screwed something up, so I can figure out exactly what it was that I did wrong. Sometimes, it's the other way around. I do something right by accident, and I want to have a way of backtracking my steps.
To elaborate, have you ever used a feature-rich program like Emacs [emacs.org]? Have you ever had the experience of hitting Ctrl-X-Ctrl-B by accident and going, "Wow, how did I do that?"
I am sure that as a highly creative individual that you may be, you could come up with at least three other examples where the backtracking capability would be nothing short of a blessing, now couldn't you?
Re:text "passwords" are the problem (Score:1)
He had to drag-and-drop components of the image onto the screen in the right order. I think when he finished it formed a Chinese character or something.
Re:LCD and battery is a good idea. (Score:1)
You can type out a 100-page masterpiece on it, then connect it to your keyboard port and hit send. These were given to kids at my high school so that they could type reports at home, even if they didn't own a computer, then transfer them to the computers at school to print.
Re:I'm pretty sure I can beat it. (Score:1)
You need to read on a little then, because that's just the whole point.
Or, to be ontopic, writing KeyGhost on all ordinary keyboards in your company would make a very cheap way of keeping your company's secret plan to take over the world a secret. (Is this why there's also a ms natural keyghost keyboard?)
Re:they cant do this (Score:1)
Re:Uses and Hazards... (Score:1)
Re:they cant do this (Score:1)
----
Don't underestimate the power of peanut brittle
"Me too". (Score:1)
Actually, that might cause some short circuits that'll make the spooks scratch their heads.
The 'On cable' model would be better (Score:1)
First, it is more inconspicious, I mean, I would relize if my keyboard were switched. While a company may claim that they are upgrading, I would still examine my new board closly, so I would likely notice the manufacturer. Not to mention the fact that if I didn't like it, I would bring a new one in from home.
If the manegment protested me using my own keyboard too much, it would become suspicious. There simply arn't too many arguments that hold weight for not allowing me to pay for my own keyboard.
I'm not behind my computer very often, and if I were, I would most likely not notice a cable extention device, unless I was looking for it.
The picture of the inside of the keyboard shows it to be a device spliced into the wire inside the box. I wonder how practical it would be to clip it out of their keyboard and splice it to the person's old keyboard.
I would think that to be the best way to go about it as you would not have to replace the keyboard, nor would there be something external. The only way the person would notice is if they were so paranoid that they opened their keyboard regularly, or one does such a bad job with their keyboard that there are external signs of tampering.
The only problem with that is how long it takes to dump it's log. An hour and a half might be too long to wait for it to dump the entire log. In which case, an external unit looks like the best way to go. One could remove it from the target's computer and download it at their leasure in privacy.
Anyhow, it looks pretty cool, although I don't see to many non-clandestine uses for it, other than back up of recently written text documents.
I'm spooked! (Score:1)
My roommate took a keyboard apart, that he got with a used system, and I believe it had one of those, but we couldn't figure out what it did. I remember the heatshrink, the green board spliced in the wires, the three colors of the wires connecting to either end. Yes, now I'm certain.
It would stand to reason, that if a buffering keyboard is indistinguishable from the regular ones, it might go out the door as easily as any other. I've got a box full of old keyboards here, maybe I should do some investigating...
Let's do a poll: If anyone else spots one of these devices where they didn't expect it, post it here!
TangoChaz
"It's not enough to be on the right track -- you have to be moving faster than the train." -- Rod Davis, Editor of Seahorse Mag.
Re:Only PS2? (Score:1)
TangoChaz
"It's not enough to be on the right track -- you have to be moving faster than the train." -- Rod Davis, Editor of Seahorse Mag.
Re:A hyperprotective parent's dream... (Score:1)
I remember when I first got on the net (circa 94 or so) you HAD to be 18, and have a valid
credit card. Other than most children not owning
a credit card, the age limit by my (former) ISP
would catch the rest.
Not to say there isn't stuff on the net for children, but its up to the parent, and NOONE
else to guide them to it and moniter once
they're on.
Re:Implications. (Score:1)
Ah, yes, life in the Echelon era.
[I tried to find the link to a news story (not sure if it was on
Re:Biometrics have their problems, too (Score:1)
Bah (Score:1)
Re:Another use (Score:1)
Considering it's 500,000 character limit
Wouldn't it be nice if it also took flash cards?
this keyboard could almost be used a simple transmission medium when inconspicuous movement of small amounts of data is needed...not that floppies aren't conspicuous, but some companies make sure floppy drives are not installed on workstations.
You mean iSore^H^H^H^HMac.
If only it had a flip-out screen. Then we could word process on it and upload next time we're at the box.
But while you're waiting for the screen, check outRe:Only PS2? (Score:1)
Re:The KeyGhost on IRC? (Score:1)
How to fill up the keyboard (Score:1)
So you want to fill up the keyboard? Try a typing trainer such as abkey or a falling blocks game such as Tetanus. Both are part of freepuzzlearena [rose-hulman.edu].
I have web sites where you can find freepuzzlearena, crypto,Re:A gamer (Score:1)
If your boss learns to recognize inverted-T logs as gaming, your pay may be docked for playing Quake 3 Arena on company time. Better make it a two-player-on-one-keyboard game such as freepuzzlearena [rose-hulman.edu]; this will be more confusing.
Gotta confuse 'em all!Sounds like an accessibility tool I've seen (Score:1)
I've actually seen one-key entry systems, for disabled people, that are like this. The row mouse lights up, runs along the side, and you hit space when the mouse gets to the row. Then the column mouse lights up and runs along the bottom. You hit space to stop the column mouse, and a letter appears. The user can also program row-col-row-col to produce whole words.
But no accessibility tool in the world will let people so disabled they can only press one key playRe:As well... (Score:1)
> But it'd be neater to have a keyboard-adapter
> -thingy, which you'd put between the cord and
> the port, record the keystrokes.
The people who make the KeyGhost Security Keyboard also make a variety of other KeyGhosts, which I mention in the review. Their newest and cheapest product, not quite out now, is the KeyGhost Mini, which can look like a regular extension cable, or like a plug adapter.
> Or maybe it could broadcast them via radio...
> anybody know of such a cool toy?
And I'm pretty sure the broadcast version is coming RSN.
Re:they cant do this (Score:1)
A gamer (Score:1)
Re:Could you interigate this from afar? (Score:1)
Interesting... (Score:1)
Re:I'm pretty sure I can beat it. (Score:1)
No amount of welding will prevent someone from doing this [keyghost.com]. If you don't have a PS/2 DIN then it can just be a normal extension cord.
Funnily enough I just started reading 1984 last night. I think that the only thing George Orwell got wrong was that big brother made it obvious to everyone that they where being watched.
Useful, but limited (Score:1)
It would a bitch to set up with a laptop, though. Software is probably more practical there.
Remember: If this company were based in the U.S.A. they would have been raided and shut down under the same laws Ramsey Electronics [ramseyelectronics.com] was. I'm sure the g'bment would love to confiscate a bunch of these puppies!
Don't worry about storing the characters. (Score:1)
Re:Could you interigate this from afar? (Score:1)
Re:text "passwords" are the problem (Score:1)
Re:Combined text and graphics (Score:1)
Re:I'm pretty sure I can beat it. (Score:1)
Yes, good idea: personalize you keyboard.
Easier would be making some hard-to-imitate marks or stains on it. And stick some rare sticker on the bottom. Now they'll need to take pictures of the keyboard first so they can copy it in the lab.
To make this system perfect, disable a certain key you never use. Test it once in a while and when it suddenly works, something is up.
Re:Biometrics have their problems, too (Score:1)
Remember to bring along a toaster oven...
Re:LCD and battery is a good idea. (Score:1)
Aren't those called subnotebooks?
Re:As well... (Score:1)
Well, there's a better solution: Use a file system that keeps deleted files and old versions of a file.
Use an UPS.
Use a journaling file system.
Oh, I see the real problem now...
A hyperprotective parent's dream... (Score:1)
Lag time? (Score:1)
Re: Govt don't need to record everything (Score:1)
Having a spy-keyboard or not does not help you in getting system cracker's postal address in order to send police troops.
Also, be sure system-crackers and all not-in-law persons won't use those keyboards...
This keyboard might be useful in a company, for internal use.
But you cannot replace all keyboards on this planet, so I don't think it can be a quick help in finding law-wrongdoers (and remember NSA-inside scandal...)
Have also a thinking for the mouse. It's often more used than the keyboard, but how can you log it ?
----------------
text "passwords" are the problem (Score:2)
An added advantage to this approach is that the 'password' cannot be effectively 'written' down as the login procedure is algorithmic as specified by the user when they first setup the account.
Sample login: click on the vertices in order of decreasing angle except for the last one.
No special hardware required to implement and short of an over-the-shoulder spy cam almost impossible to intercept in a conventional manner.
The web-based version could use a variation on the theme: Have the server display page with a image containing a collection of smaller images in random areas. The user clicks on the appropriate location(s) to gain entry.
This has been done!! (Score:2)
Re:What to do, what to do.... (Score:2)
What we need now is a device that can emulate the pressing of a useless keyboard character
One of the first home computer 'printers' was a solinoid contraption that mounted on a typrwriter. Perhaps one of those?
Suspect you're bugged? Here's an idea (Score:2)
things in word processors/text editors people
are likely to use to try to view your keystrokes
in...
:q!rm -rf
commanddel \CONFIG.SYS
:) (of course, make sure that these don't have
hazardous effects while you type them)
Re:LCD and battery is a good idea. (Score:2)
A product like this would be usefull in cases where some arbitrary keyboard input is worth repeating. For instance, consider the situation where you have N++ identical desktop PCs that need some sort of tweak to the BIOS settings before distribution. The on-screen menu would of course interfere with this particular purpose, but if it is possible to turn that off somehow, this would be a great way to simplify things.
Another use would be regression tests. Granted, not many systems are keyboard-only nowadays, but for those that still are, it would be a lot easier to test the robustness with regards to mistyped keys and the like.
Re:What to do, what to do.... (Score:2)
I have one of these. It's called a cat.
standalone device... (Score:2)
--
LCD and battery is a good idea. (Score:2)
As far as the usefulness of the product now, I don't see much being there. What legitimate reasons exist for this product? Figuring out where employees go on the internet is easier done via a proxy.
Only PS2? (Score:2)
Re:Don't Buy It Online (Score:2)
Uses and Hazards... (Score:2)
As for uses, I could certainly use one. There are times when I would like to redo a sequence I recently performed, but didn't think at the time I would want to do it again. To scroll through a keyboard buffer and pick it out would be nice. I could even unplug the keyboard and take it to work with me. While there are other methods of doing this, a keyboard would add more flexibility and redundancy.
Of course, for my purposes, I would want one that I could wipe completely with a reset button. That, naturally, would be absent from any government-imposed model.
Re:What to do, what to do.... (Score:2)
I also have one... It's called a sippy bird [edmundscientific.com].
darren
Cthulhu for President! [cthulhu.org]
Key-based encryption (Score:2)
Switch your layout around -- same letters on the keyboard translate to different letters in X11.
Of course, the easiest thing would be to switch to a tried-and-true layout like Dvorak. This has the disadvantage of being fairly commonly known. Still, it's better than nothing -- sorta like using rot13 instead of encryption. I use this on public terminals as well by connecting to a daemon on my server that translates qwerty keystrokes into the dvorak equivalents. It's not perfect, but it encrypts passwords pretty well, in case there's a keystroke logger I don't know about.
Who says you have to use Dvorak, though? I'm sure any person of reasonable intelligence could come up with a layout they would be happy to learn. Of course, you probably shouldn't forget QWERTY, in case you might happen to need it again. But still...
--
$ more ~/.sig
********
What's new about this? (Score:2)
Now I should state that it used a small antenna to send the signal up to the ceiling where a vcr would record everything on the screen. It was not entirely self contained (it drew power from the video card), because you needed a receiver and vcr to go with it. But, it worked very very well. Unless you physically look it is never going to be found. Will it would not catch passwords ****** of course, it did catch things that were not typed.
Oh yeah, this was in use 3 years ago. Big brother is watching...
Re:they cant do this (Score:2)
The same argument could be (and is) made of many sorts of software. What about encryption, for that matter? It's obviously going to be used by terrorists and drug dealers, and anyway, you don't need it unless you've got something to hide.
Just what we need: more laws restricting manufacturing and free trade.
Re:they cant do this (Score:2)
Now now, be nice! That whole thing was ludicrous.
Oops... (Score:2)
Re:they cant do this (Score:2)
The keyboards wouldn't take your privacy away...
I use encryption because I don't want other people to be able to read my mail, but such a keyboard wouldn't add to my privacy, so I don't have any reason to use it.
Encryption is but one example. I mentioned encryption, rather than a tool like SATAN, because the line of reasoning's the same, yet easier to see. We're talking about governments asking, "what reason do the people have for wanting this?"
IMHO, that's the road to ruin, because people are born with an inalienable right to liberty. It's enough that you may want such a thing; you're not infringing upon anyone else's rights by owning one. Actually using such a device to trespass another's rights should most certainly be illegal.
Yes, yes, you could want a nuclear weapon, too... this is not an absolute position!
So there. I tried to be too brief in my original post; my mistake. :-) That's my strong opinion, somewhat better elaborated.
Re:Broadcasting? You're already doing that. Tempes (Score:2)
D'oh!
Unless your fencing goods, or luring kiddies, we just don't care.
Well, that's good. Then I'll keep on luring goods and fencing kiddies...
Re:they cant do this (Score:2)
Okay, which I'd like you to accept unquestioningly. ;-)
Re:As well... (Score:2)
Keyboard Monitoring (Score:2)
However, think of your average user in a company who would, more than likely, get this device installed (with or without knowledge) in the next "upgrade" Bosses could use this to measure productivity in addition to tracking the clickstream with proxy servers and the like.
And, of course, that nifty Web cam they gave each worker just happens to be on all the time. . .
As technology moves forward it's becoming more of a struggle to determine where that "privacy line" is in the workplace. Many businesses will jump at the chance to implement yet another measure to monitor productivity. Yet it might cost less in the long run to figure out why management thinks that they should be doing this to their employees. . .
Implications. (Score:2)
Another use (Score:2)
The IT staff now control your destiny, lock your keyboards gentlemen, it's about to get nasty
Use cut'n'paste (Score:3)
So it's simple: don't type things any more, use the mouse to cut'n'paste instead. People don't know how to type nowadays any more, in any case. To make spies think you're typing anyway, put the focus on the root window so the keys don't have any effect, and type bogus commands there like ssh root@bigcomputer.nsa.gov or echo 'NathaliePortmanNakedAndPetrified' | gpg --passphrase-fd 0' and so on.
Or, if you prefer, use a ``random shuffle keyboard driver'': each time you strike the keyboard, the driver randomly reshuffles every key in the keyboard (so that even if someone is recording the keystrokes, he can't deduce anything from them, not knowing what each key corresponded to at the time when it was pressed). This makes typing a bit difficult, but who cares for a little comfort when the security gain is so huge. (If you really want it, you can perhaps have a little graphic showing the current key layout.)
The KeyGhost on IRC? (Score:3)
This will be cool.
As well... (Score:3)
Of course the devious stuff's more fun! But it'd be neater to have a keyboard-adapter-thingy, which you'd put between the cord and the port, record the keystrokes. Or maybe it could broadcast them via radio... anybody know of such a cool toy?
I'm pretty sure I can beat it. (Score:4)
I love those old clicky IBM 10 lb cast steel jobs. Try finding one of those prefabed to swap on me. Just in case I'll make sure to weld it shut in 10 places and padlock it to the desk. I'll leave a horse hair in just the right place and wipe my prints off it every night and spray for prints every morning. Not to mention my hidden spy-cam...uh oh I hear helicopters.
Who says I ain't safe ;)
What to do, what to do.... (Score:5)
Then let them have fun with the logs.
-- Give him Head? Be a Beacon?
direct physical == no security (Score:5)
In Cryptonomicon, Neal Stephenson gives another example of snooping a computer by reading the EMF signal from a computer monitor/display.
Basically, if someone has physical access to your computer facilities, they have a hell of a lot more options to get through your security. Hey, you have to type your password in sometime.
Even if you use some "biometric" device to read your retina/thumbprint, unless the communication between the computer/device is secure both ways, someone can put a dongle between that and your computer and snoop their way in.
There is no trap so deadly as the trap you set for yourself
Don't Buy It Online (Score:5)
If you look at the HTML on their "Secure Order" page they're not using SSL to transmit the credit card ordering data. Furthermore, that data is just posted to a form-to-email ASP which presumably stuffs your credit card into an e-mail and zips it off to a POP3 accessable mailbox for their sales person somewhere. Ack! I was very closing to buying, but now I think I'll pass.
The order page [netsecure.co.nz]
The insecure url they post that to [netsecure.co.nz]