I've always been worried about adding tracepoint instrumentation of theThe evtest tool can also do this.
input subsystem that includes the actual keystrokes into the event
payload. What I'm trying to avoid here is people leaking their password
by mistake just because they happened to record a trace while
typing on their keyboard.
I don't mind if this gets enabled with a new kernel command lineI'm not sure if this is over-engineering...
options "tracing_leak_my_credentials=yes" or such, but I'd try to
avoid making it easy to enable by mistake unless this information
is specifically needed.
But maybe I'm being too careful and people should really learn notThanks,
to share kernel traces with others.
Thoughts ?
Attachment:
OpenPGP_0xC5DA1F3046F40BEE.asc
Description: OpenPGP public key
Attachment:
OpenPGP_signature.asc
Description: OpenPGP digital signature