From Fedora Project Wiki

Line 6: Line 6:


* Grabbing has never been a security feature. You can already snoop on a grabbed device, either using raw events or by registering for slave device events. We're trying to get the priority system right so that e.g. gnome-screensaver can assume it's the top-most grab-override and get events first, but that's about it. 03:13, 22 December 2011 (UTC)
* Grabbing has never been a security feature. You can already snoop on a grabbed device, either using raw events or by registering for slave device events. We're trying to get the priority system right so that e.g. gnome-screensaver can assume it's the top-most grab-override and get events first, but that's about it. 03:13, 22 December 2011 (UTC)
** How can one snoop on a grabbed device via the X protocol?  Or are you talking about opening up /dev/input*?

Revision as of 03:19, 22 December 2011

Security?

Could you spell out any possible security implications of overridden grabs? Could malevolent X apps start to snoop in on password-prompting windows, for example? Fche 03:08, 22 December 2011 (UTC)

  • Grabbing has never been a security feature. You can already snoop on a grabbed device, either using raw events or by registering for slave device events. We're trying to get the priority system right so that e.g. gnome-screensaver can assume it's the top-most grab-override and get events first, but that's about it. 03:13, 22 December 2011 (UTC)
    • How can one snoop on a grabbed device via the X protocol? Or are you talking about opening up /dev/input*?