this post was submitted on 05 Oct 2025
98 points (99.0% liked)

Hardware

4525 readers
125 users here now

All things related to technology hardware, with a focus on computing hardware.


Rules (Click to Expand):

  1. Follow the Lemmy.world Rules - https://mastodon.world/about

  2. Be kind. No bullying, harassment, racism, sexism etc. against other users.

  3. No Spam, illegal content, or NSFW content.

  4. Please stay on topic, adjacent topics (e.g. software) are fine if they are strongly relevant to technology hardware. Another example would be business news for hardware-focused companies.

  5. Please try and post original sources when possible (as opposed to summaries).

  6. If posting an archived version of the article, please include a URL link to the original article in the body of the post.


Some other hardware communities across Lemmy:

Icon by "icon lauk" under CC BY 3.0

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] Alphane_Moon@lemmy.world 29 points 1 month ago (1 children)

At first I thought this was a curious proof of concept exploit that is fun to read about, but not really relevant.

This kind of compromise doesn't require elaborate malware installations. Any application, such as a game or creative software, that legitimately requests high-frequency mouse data could be exploited if compromised. Once captured, the data can be transmitted off-site for analysis, allowing sensitive conversations to be intercepted without any obvious sign to the victim.

But lo and behold, turns out this method is actually not just purely theoretical. Sure, you would have deploy a malware application or exploit another app, but this is still very much within the realms of viability.

[โ€“] NaibofTabr@infosec.pub 21 points 1 month ago

Sure, you would have deploy a malware application

Like an application for customizing the RGB on your super cool gamer mouse?