JakobE wrote:
Another one is of course to add a configurable option to change the key to a Dvorak layout.
[...] what if a saboteur would flip this flag ?
My vote goes to the serverside. IMO the firmware already has too many features as it is.
While at it: may I suggest we have the option to install hardened firmware - that is: firmware that does not have all the options like capslock double-clicking, surfing to an URL etc.?
The bytes freed might be used to store a new function; one to offer better protection against malicious re-programming of the key. I suggest having the key send a string of random bytes if it receives a 'programming request'. These bytes need to be encrypted by the programming process using the key's current AES secret. The programming proces subsequently sents the encrypted string back to the key. Only if the key can decrypt the message, programming is allowed (including updating of the AES string etc.). Also, the key should cease to function for a minute if an unsuccesfull attempt was made to program it while blinking the ring in a fast pace. On the second try, the key should double the time it ceases functioning etc. [not sure if unplugging would have to stop the cycle or restart it; from a security perspective I'd say 'restart it'].
Will put this idea on the ideas page later, if someone wants to discuss it, we may need to start a new thread.