{"id":97936,"date":"2019-07-26T21:29:06","date_gmt":"2019-07-27T01:29:06","guid":{"rendered":"http:\/\/rbach.net\/index.php\/"},"modified":"2021-08-18T16:40:53","modified_gmt":"2021-08-18T20:40:53","slug":"fix-your-dongle-today","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/fix-your-dongle-today\/","title":{"rendered":"Fix Your Dongle &#8211; Today"},"content":{"rendered":"<p><a href=\"https:\/\/www.mousejack.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98463\" title=\"Fix Your Dongle - Today\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mousejack-e1564021745908-150x137.jpeg?resize=100%2C91&#038;ssl=1\" alt=\"Fix Your Dongle - Today\" width=\"100\" height=\"91\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mousejack-e1564021745908.jpeg?resize=150%2C137&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mousejack-e1564021745908.jpeg?resize=75%2C68&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mousejack-e1564021745908.jpeg?w=345&amp;ssl=1 345w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>If you use a <a href=\"https:\/\/www.logitechg.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Logitech<\/strong><\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-LOGI\/\" target=\"_blank\" rel=\"noopener noreferrer\">LOGI<\/a>) <strong>wireless <a href=\"https:\/\/youtu.be\/SlH5blQp7xg\" target=\"_blank\" rel=\"noopener noreferrer\">mouse<\/a>, keyboard<\/strong> or other device <strong>fix your dongle<\/strong>! The Logitech <strong>wireless dongle<\/strong> (officially Unifying Receiver) is <strong>vulnerable<\/strong> to an issue discovered in 2016 as well as newly discovered vulnerabilities unless you&#8217;ve updated the firmware. Download and <strong>install the <a href=\"https:\/\/web.archive.org\/web\/20230408112031\/https:\/\/support.logi.com\/hc\/en-us\/community\/posts\/360033207154-Logitech-Unifying-Receiver-Update\" target=\"_blank\" rel=\"noopener noreferrer\">latest firmware<\/a><\/strong> update to protect against vulnerabilities.<\/p>\n<h3>Mousejack attach<\/h3>\n<p><a href=\"https:\/\/www.logitechg.com\/en-us\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98465\" title=\"Logitech logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Logitech_logo.jpg?resize=75%2C75&#038;ssl=1\" alt=\"Logitech logo\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Logitech_logo.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Logitech_logo.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Logitech_logo.jpg?w=185&amp;ssl=1 185w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>Affected Logitech wireless devices are vulnerable to a hack called &#8220;<strong><a href=\"http:\/\/www.bastille.net\/research\/vulnerabilities\/mousejack\/technical-details\" target=\"_blank\" rel=\"noopener noreferrer\">Mousejack<\/a><\/strong>.&#8221; Mousejack, (CVE-2016-10761) was first reported in <strong>2016<\/strong> by IoT security firm <a class=\"external text\" href=\"https:\/\/www.bastille.net\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Bastille Networks, Inc<\/a>. The Mousejack <a href=\"https:\/\/en.wikipedia.org\/wiki\/Logitech_Unifying_receiver\" target=\"_blank\" rel=\"noopener noreferrer\">attach works<\/a> by sending <strong>malicious radio signals<\/strong> (packets) wirelessly to an unsuspecting user through Logitech Unifying wireless technology. Logitech only <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/logitech-unifying-receivers-vulnerable-to-key-injection-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">partially fixed<\/a> the hole (<a href=\"https:\/\/www.kb.cert.org\/vuls\/id\/981271\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cert VU#981271<\/a>) in 2016. Mousejack uses the vulnerable <strong>Logitech Unifying receiver<\/strong> to intercept and inject unencrypted signals within a <strong>range of about 100 meters<\/strong>.<\/p>\n<h3>Incomplete fix<\/h3>\n<p>Logitech did not recall the Unifying Receiver back in 2016 when <a href=\"http:\/\/www.bastille.net\/research\/vulnerabilities\/mousejack\/technical-details\" target=\"_blank\" rel=\"noopener noreferrer\">Mousejack<\/a> appeared. Four <strong>new vulnerabilities<\/strong> were discovered in <strong>2019<\/strong>. The new <strong>vulnerabilities<\/strong> are based on the incomplete 2016 fix. Logitech will only fix two of the four vulnerabilities, the others will remain unpatched. The <strong>vulnerabilities<\/strong> are logged as:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.computerworld.com\/article\/2515435\/moth-in-the-machine--debugging-the-origins-of--bug-.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98477\" title=\"Computer bug\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bug-1.jpg?resize=89%2C59&#038;ssl=1\" alt=\"Computer bug\" width=\"89\" height=\"59\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bug-1.jpg?w=380&amp;ssl=1 380w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bug-1.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bug-1.jpg?resize=150%2C100&amp;ssl=1 150w\" sizes=\"auto, (max-width: 89px) 100vw, 89px\" \/><\/a><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-13052\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-13052<\/a>,<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-13053\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-13053<\/a>,<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-13054\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-13054<\/a>, and<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-13055\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-13055<\/a>.<\/li>\n<\/ul>\n<p>Logitech <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/logitech-unifying-receivers-vulnerable-to-key-injection-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>will not fix<\/strong><\/a> the holes identified in CVE-2019-13052 or CVE-2019-13053, both of which impact all Logitech Unifying devices. A Logitech representative <a href=\"https:\/\/www.theverge.com\/2019\/7\/14\/20692471\/logitech-mousejack-wireless-usb-receiver-vulnerable-hack-hijack\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <a href=\"https:\/\/www.theverge.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>the Verge<\/em><\/a>:<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>Logitech evaluated the risk to businesses and to consumers and did not initiate a recall of products or components already in the market and supply chain.<\/em><\/p>\n<p><a href=\"https:\/\/www.logitech.com\/en-ca\/computer-accessories?filters=consumer\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98464\" title=\"Logitech wireless mouse\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/1-m510-black-e1564019855575-150x88.png?resize=79%2C46&#038;ssl=1\" alt=\"Logitech wireless mouse\" width=\"79\" height=\"46\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/1-m510-black-e1564019855575.png?resize=150%2C88&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/1-m510-black-e1564019855575.png?resize=75%2C44&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/1-m510-black-e1564019855575.png?w=490&amp;ssl=1 490w\" sizes=\"auto, (max-width: 79px) 100vw, 79px\" \/><\/a>Logitech plans to patch the security flaws in CVE-2019-13054 (impacts Logitech R500, Logitech SPOTLIGHT) and CVE-2019-13055 which affects all encrypted Unifying devices with keyboard capabilities.<\/p>\n<h3>All Logitech USB dongles<\/h3>\n<p><a href=\"https:\/\/twitter.com\/mame82?lang=en\" target=\"_blank\" rel=\"noopener noreferrer\">Marcus Mengs<\/a>, the researcher who discovered <a href=\"https:\/\/github.com\/mame82\/misc\/blob\/master\/logitech_vuln_summary.md\" target=\"_blank\" rel=\"noopener noreferrer\">these vulnerabilities<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/logitech-wireless-usb-dongles-vulnerable-to-new-hijacking-flaws\/\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <a href=\"https:\/\/www.zdnet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>ZDNet<\/em> <\/a>the vulnerabilities impact <strong>all Logitech USB dongles<\/strong> that use the company&#8217;s proprietary &#8220;<a href=\"https:\/\/support.logi.com\/hc\/en-us\/articles\/360025297913\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Unifying<\/strong><\/a>&#8221; 2.4 GHz radio technology to communicate with wireless devices.<\/p>\n<p>Unifying is a Logitech standard dongle <strong>radio technology<\/strong>, and has been shipping with a wide range of Logitech wireless gear <strong>since 2009<\/strong>. The dongles are often found with the company&#8217;s wireless keyboards, mice, presentation clickers, trackballs, and more.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<div id=\"sharethrough-top-5d379b271c18c\" class=\"ad-sharethrough-top\" data-ad=\"sharethrough-top\">According to numerous sites, the vulnerabilities allow attackers to:<\/div>\n<\/section>\n<ul>\n<li>Sniff keyboard traffic,<\/li>\n<li>Inject keystrokes (even into dongles not connected to a wireless keyboard)<\/li>\n<li>Take over the computer to which a dongle has been connected.<\/li>\n<li>Steal the encryption key between the dongle and its paired device<\/li>\n<li>Bypass a &#8220;key blacklist&#8221; designed to prevent the paired device from injecting keystrokes<\/li>\n<\/ul>\n<div id=\"attachment_98466\" style=\"width: 629px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.bastille.net\/research\/vulnerabilities\/mousejack\/technical-details\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-98466\" class=\"wp-image-98466 size-full\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Howmousejackworks.png?resize=480%2C191&#038;ssl=1\" alt=\"\" width=\"480\" height=\"191\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Howmousejackworks.png?w=619&amp;ssl=1 619w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Howmousejackworks.png?resize=75%2C30&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Howmousejackworks.png?resize=150%2C60&amp;ssl=1 150w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/a><p id=\"caption-attachment-98466\" class=\"wp-caption-text\"><em>Bastille Networks<\/em><\/p><\/div>\n<p><em><a href=\"https:\/\/www.techsupportalert.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Techsupportalert.com<\/a><\/em> <a href=\"https:\/\/web.archive.org\/web\/20210712033939\/https:\/\/www.techsupportalert.com\/content\/update-your-logitech-wireless-dongle-right-now.htm\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that many of the vulnerable dongles are <strong>still on the market<\/strong> even though Logitech started releasing updated dongles sold with mice, keyboards, and stand-alone receivers.<\/p>\n<h3>\u00a0Hard to find firmware update<\/h3>\n<p><em><a href=\"https:\/\/www.lydo.nl\/olive\/update-firmware-on-olive-hd-models\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98467\" title=\"firmware update\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firmware.png?resize=62%2C62&#038;ssl=1\" alt=\"firmware update\" width=\"62\" height=\"62\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firmware.png?w=128&amp;ssl=1 128w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/firmware.png?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 62px) 100vw, 62px\" \/><\/a><\/em>Not long after the discovery, <em>Techsupportalert.com, says<\/em> Logitech issued a <strong>firmware update<\/strong> but it was <strong>hard to find<\/strong> on the support site and wasn&#8217;t widely known. If you didn&#8217;t update the firmware then (and most of us didn&#8217;t know about it) now is an excellent time to update.<\/p>\n<p>Even if you installed the Logitech drivers and configuration app that came with the device, you are not protected. The required <strong>firmware update<\/strong> is not included, it <strong>must be downloaded and installed separately<\/strong>.<\/p>\n<p>Give credit to Logitech, their <strong>firmware can be updated<\/strong>, where other manufacturer&#8217;s wireless dongles cannot be updated. This includes <a href=\"https:\/\/www.bastille.net\/research\/vulnerabilities\/mousejack\/affected-devices\" target=\"_blank\" rel=\"noopener noreferrer\">products from<\/a> Microsoft, <a href=\"http:\/\/www.dell.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dell<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-DELL\/\" target=\"_blank\" rel=\"noopener noreferrer\">DELL<\/a>, <a title=\"HP\" href=\"http:\/\/www.hp.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">HP<\/a> (<a title=\"NYSE : HPQ\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:HPQ\" target=\"_blank\" rel=\"noopener noreferrer\">HPQ<\/a>), and <a href=\"http:\/\/www.lenovo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lenovo<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/OTC-LNVGY\/\" target=\"_blank\" rel=\"noopener noreferrer\">LNVGY<\/a>). In fact, any device that uses the same <a href=\"https:\/\/nordicsemi.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nordic Semiconductor<\/a> or <a title=\"Texas Instruments\" href=\"https:\/\/en.wikipedia.org\/wiki\/Texas_Instruments\" target=\"_blank\" rel=\"noopener noreferrer\">Texas Instruments<\/a> (<a title=\"NYSE : TXN\" href=\"https:\/\/www.nyse.com\/quote\/XNGS:TXN\" target=\"_blank\" rel=\"noopener noreferrer\">TXN<\/a>) chips and firmware for wireless receivers is vulnerable. The <a href=\"https:\/\/web.archive.org\/web\/20220528195722\/https:\/\/www.kismetwireless.net\/docs\/readme\/datasources_nrf_mousejack\/\" target=\"_blank\" rel=\"noopener noreferrer\">NordicRF nRF<\/a> chip is a common chip used in wireless keyboards, mice, and presentation tools, which are frequently found in non-Bluetooth wireless input devices.<\/p>\n<p>If you use a wireless device from Logitech or the Lenovo 500 devices, Bastille <strong>recommends you update your firmware<\/strong>. Any other non-Bluetooth wireless devices should be <strong>disconnected<\/strong> and you should contact your vendor and ask what models are not vulnerable before you <strong>replace your current gear<\/strong>.<\/p>\n<p>Lenovo&#8217;s announcement <a href=\"https:\/\/web.archive.org\/web\/20240418195339\/https:\/\/support.lenovo.com\/us\/en\/product_security\/len_4292\" target=\"_blank\" rel=\"noopener noreferrer\">is here<\/a>.<\/p>\n<p>Logitech&#8217;s announcement\u00a0<a href=\"https:\/\/web.archive.org\/web\/20230408112031\/https:\/\/support.logi.com\/hc\/en-us\/community\/posts\/360033207154-Logitech-Unifying-Receiver-Update\" target=\"_blank\" rel=\"noopener noreferrer\">is here<\/a>.<\/p>\n<p>Here are the direct download links to the Logitech Unifying Receiver firmware update for PC, Mac, and the gaming mouse:<\/p>\n<ul>\n<li>Logitech PC firmware update (zip)<\/li>\n<li>Logitech Mac firmware update (zip)<\/li>\n<li>Logitech G900 gaming mouse firmware update (zip)<\/li>\n<\/ul>\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Logitech_Unifying_receiver\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98461\" title=\"Logitech Unifying Receiver\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Logitech_Unifying_Receiver_USB-e1564004630848-150x121.jpg?resize=90%2C72&#038;ssl=1\" alt=\"Logitech Unifying Receiver\" width=\"90\" height=\"72\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Logitech_Unifying_Receiver_USB-e1564004630848.jpg?resize=150%2C121&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Logitech_Unifying_Receiver_USB-e1564004630848.jpg?resize=75%2C60&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Logitech_Unifying_Receiver_USB-e1564004630848.jpg?w=242&amp;ssl=1 242w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>You probably have an affected device on your network. Logitech has sold well over a <a href=\"https:\/\/web.archive.org\/web\/20210314192438\/https:\/\/www.networkworld.com\/article\/3036463\/countless-computers-vulnerable-to-mousejack-attack-through-wireless-mice-and-keyboards.html\" target=\"_blank\" rel=\"noopener noreferrer\">billion mice<\/a>. Users can recognize if they&#8217;re using a vulnerable dongle if it has an orange star printed on one of its sides.<br \/>\n<\/em><\/p>\n<p><em>If you have any extra Logitech wireless dongles around (I have several) you may want to update them.<\/em><\/p>\n<p><em>You should also check back in with Logitech support, to see if the promised <strong>additional fixes will be forthcoming in August 2019<\/strong>.<\/em><\/p>\n<h6>Related Posts<\/h6>\n<ul>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/academics-steal-data-from-air-gapped-systems-via-a-keyboards-leds\/\" target=\"_blank\" rel=\"noopener noreferrer\">Academics steal data from air-gapped systems via a keyboard&#8217;s LEDs<\/a> (<a href=\"https:\/\/www.zdnet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZDNet<\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is your Logitech wireless dongle open to a hack? it usunless you update firmware today. LOGI will not fix all security holes ID&#8217;d by Marcus Mengs<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3326,3161,3320,67,162,3317,3318,3319,3321,3324,3322,4,1276,3323,3325,2923,25],"class_list":["post-97936","post","type-post","status-publish","format-standard","hentry","category-security","tag-2-4-ghz","tag-3161","tag-dongle","tag-hack","tag-keyboard","tag-logi","tag-logitech","tag-moue","tag-mousejack","tag-nordic-semiconductor","tag-presentation-clickers","tag-security","tag-texas-instruments","tag-trackballs","tag-txn","tag-vulnerabilities","tag-wireless"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/97936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=97936"}],"version-history":[{"count":14,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/97936\/revisions"}],"predecessor-version":[{"id":132098,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/97936\/revisions\/132098"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=97936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=97936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=97936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}