this post was submitted on 24 Aug 2023
142 points (97.3% liked)

Privacy

31935 readers
750 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I was taking a look at the Naomi Wu situation (A Chinese DIY tech youtuber who went missing after being watched by the government) and in one part they mentioned that she was concerned about her privacy, so started using Signal, but had a default chinese keyboard that had a keylogger and the police had looked into what she was talking on there.

I'm not sure if it was a mobile only thing, but it was mentioned that the keyboard app was used in like 70% por chinese smarthphones.

Now, I use AnySoftKey and refuse to use default keyboard apps, but how far can we reach on the keyboard security thing? Is typing on a computer or using a physical keyboard on a mobile device 100% safe? I think the keyboard issue is often overlooked and would like to know what recommendations your have? Or what should be known more?

you are viewing a single comment's thread
view the rest of the comments
[–] jet@hackertalks.com 8 points 1 year ago* (last edited 1 year ago) (2 children)

All that comes down to your threat model.

If you're very concerned about sophisticated actors getting effectively keyloggers on you. Install a privacy focused operating system on your phone, like graphene os (fixed spelling). Don't change the keyboard. Keep the default secure keyboard.

For your physical computer, uses very standard keyboard. Nothing fancy nothing that's reprogrammable. Most people have USB keyboards nowadays, make sure you plug your keyboard and mouse into their own USB controller, so nothing can snoop those keystrokes. Don't use a KVM, don't use a fancy monitor that basically got a computer inside of it.

If you think you might be a target, buy your keyboard with cash, in fact by all of your electronics of cash, don't order anything for delivery. They could get tampered with on the way to you.

[–] LainOfTheWired@lemy.lol 10 points 1 year ago (2 children)

I mean if you're that concerned get a thinkpad X200, libre boot it, and run qubes OS

[–] jet@hackertalks.com 7 points 1 year ago* (last edited 1 year ago)

Good idea, if it fits your threat model.

If your threat model trusts google, then a locked down Chromebook is fine too

The EFF has some good guides to help you design your threat model and tolerances.

https://www.eff.org/deeplinks/2020/06/digital-security-advice-journalists-covering-protests-against-police-killings

Https://ssd.eff.org

[–] authed@lemmy.ml 2 points 1 year ago (1 children)

Qbues on whonix is even better

[–] doppelgangmember@lemmy.world 1 points 1 year ago

This Tails if you dont got the time

[–] ReversalHatchery@beehaw.org 5 points 1 year ago

At least we could name things properly. I'm 120% sure people who don't know graphene os have no idea what you mean by grafine os, and by searching they may even find something that's a bad knockoff or something like that.
Please always type names correctly, and also include a link to the official website, so that people don't install some literal spyware because they don't know better.


The commenter was meaning refer to graphene os: https://grapheneos.org
It's important to mention that it is only available for Google Pixel phones, and as such it is also unfit as a general recommendation that "you should install this on your phone".