On 06/08/2014 22:09, James Cameron wrote: > Despite the availability of these tools, we still get people unable to bo= ot > from USB. ;-} > > However, this doesn't address the keyboard and mouse emulation attack vec= tor, > which can happen once the operating system has booted.=20 For the keyboards, it would be possible to use an authentication like that = of bluetooth, requiring that the user types a random sequence. If the keyboard= is fake will not be authenticated. --=20 http://www.piclist.com/techref/piclist PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist .