zlacker

[parent] [thread] 77 comments
1. OtherS+(OP)[view] [source] 2023-08-05 20:24:31
I believe that is the generalisable version of the attack. You're not looking to learn the sound of arbitrary keyboards with this attack, rather you're looking to learn the sound of specific targets.

For example, a Twitch streamer enters responses into their stream-chat with a live mic. Later, the streamer enters their Twitch password. Someone employing this technique could reasonably be able to learn the audio from the first scenario, and apply the findings in the second scenario.

replies(6): >>yowzad+61 >>dvngnt+39 >>TechBr+3b >>bitshi+Dn >>hacker+WE >>dools+5H
2. yowzad+61[view] [source] 2023-08-05 20:32:53
>>OtherS+(OP)
I guess more reason to just use a password manager to autofill your password?
replies(2): >>kypro+82 >>jgtros+K9
◧◩
3. kypro+82[view] [source] [discussion] 2023-08-05 20:41:31
>>yowzad+61
Or just use 2fa
replies(2): >>bee_ri+E3 >>barrot+1v
◧◩◪
4. bee_ri+E3[view] [source] [discussion] 2023-08-05 20:53:12
>>kypro+82
If you have 2FA and one part of it is easily figured out, then you have one factor authentication.

If you cared enough about the authentication in the first place to bother with 2FA, then I guess it seems like the reduction there is still something to be worried about, right?

Lots of “two factor authentication” schemes seem to involve just getting a text or something, so, not very secure at all. Of course, this is bad 2FA, but it is popular.

replies(2): >>gleenn+l5 >>GhostW+vb1
◧◩◪◨
5. gleenn+l5[view] [source] [discussion] 2023-08-05 21:07:46
>>bee_ri+E3
Perfect is the enemy of good. Text based 2FA is compromisable relatively easily but at least it's an extra hurdle.
replies(1): >>3np+Xf
6. dvngnt+39[view] [source] 2023-08-05 21:36:48
>>OtherS+(OP)
for a few years I've used rtx voice to remove keyboard typing and other background noise
◧◩
7. jgtros+K9[view] [source] [discussion] 2023-08-05 21:45:06
>>yowzad+61
Only if it doesn't only rely on a master password
replies(5): >>apendl+8c >>Guvant+Hk >>lamont+Xr >>kristo+CL >>teduna+jN
8. TechBr+3b[view] [source] 2023-08-05 21:56:33
>>OtherS+(OP)
Finally, a real security weakness to cite when making fun of people for their mechanical keyboard. Time to start recording the audio of Zoom calls with some particularly loud typers...
replies(7): >>fatfin+Nb >>tharne+PI >>Spooky+fN >>jayd16+nR >>worthl+FT >>marvin+l41 >>WWLink+BZ3
◧◩
9. fatfin+Nb[view] [source] [discussion] 2023-08-05 22:04:17
>>TechBr+3b
Not according to the article.. Microphones are sensitive enough to mount the attack on quieter keyboards.
replies(2): >>therei+qc >>Aerroo+SC
◧◩◪
10. apendl+8c[view] [source] [discussion] 2023-08-05 22:06:32
>>jgtros+K9
A nice thing about master passwords though is that since you don't have to type them in as often, they can be very long. 95% accuracy probably isn't good enough to reliably reproduce a sentence-length master password, at least if it's only captured once.
replies(4): >>belval+Kg >>koolba+Ui >>SideQu+cr >>coldte+9V
◧◩◪
11. therei+qc[view] [source] [discussion] 2023-08-05 22:08:21
>>fatfin+Nb
What we clearly need are louder keyboards - which overload the mic so as to render keystrokes indistinguishable.
replies(4): >>meepmo+dd >>TheCle+vh >>busyan+Pp >>tiltow+Aw
◧◩◪◨
12. meepmo+dd[view] [source] [discussion] 2023-08-05 22:16:19
>>therei+qc
I've wanted to integrate a cap gun into a keyboard, basically a an old fashioned roll of paper caps and solenoid to whack 'em, triggered by exclamation points.
◧◩◪◨⬒
13. 3np+Xf[view] [source] [discussion] 2023-08-05 22:42:39
>>gleenn+l5
It's the "or just" being the issue there, not the "use 2fa".
◧◩◪◨
14. belval+Kg[view] [source] [discussion] 2023-08-05 22:50:29
>>apendl+8c
95% means that on average only 1 in 20 keystroke will be wrong. Even if your password is very long (40-60) that means only 2-3 errors. Since more people are not machines their long password will be a combination of words like the famous "horsestaplebatterycorrect" example from xkcd.

Even if you flip a few letters from something like the above a human attacker will easily be able to fix it manually.

"horswstaplevatterucorrect" for example is still intelligible.

replies(1): >>TheCle+Nh
◧◩◪◨
15. TheCle+vh[view] [source] [discussion] 2023-08-05 22:58:08
>>therei+qc
Adding a gain knob to my keyboard, be right back.
replies(2): >>idbeho+bo >>somepl+Ax
◧◩◪◨⬒
16. TheCle+Nh[view] [source] [discussion] 2023-08-05 23:01:57
>>belval+Kg
On average 2-3 errors. However the real thing we want to look at is what is my chance of guessing right across ALL characters. For 1 it's 95%, for 2 it's 90.2%, and it gets worse from there. The formula for accuracy would be .95^c where c is the number of characters in the password. So the chance of getting EVERY key correct in a 40 character password is < 13% and < 5% for 60 characters.
replies(3): >>llbean+Gn >>whelp_+no >>rightb+TD
◧◩◪◨
17. koolba+Ui[view] [source] [discussion] 2023-08-05 23:12:24
>>apendl+8c
The master password is also offline and require the key file to u lock the rest of the passwords. So by itself it’s not enough to compromise the accounts in the key file. The attacker would need the key file as well.
◧◩◪
18. Guvant+Hk[view] [source] [discussion] 2023-08-05 23:25:53
>>jgtros+K9
Doesn't everybody not require only a password?

Offline you need the database which isn't public.

Online you usually need something else on new machines to get at the true master password.

19. bitshi+Dn[view] [source] 2023-08-05 23:52:07
>>OtherS+(OP)
I think maybe you wouldn't even need to see the keystrokes. Given enough examples of just audio, I wonder if you could work out the keys using the statistical letter patterns in language.
◧◩◪◨⬒⬓
20. llbean+Gn[view] [source] [discussion] 2023-08-05 23:52:46
>>TheCle+Nh
Right. The comment above is saying even if you are incorrect in 2-5 keystrokes it’s not hard to guess the correct keystrokes if you’re using a sentence style password.

You don’t need to guess every character.

◧◩◪◨⬒
21. idbeho+bo[view] [source] [discussion] 2023-08-05 23:56:03
>>TheCle+vh
When conducting coding interviews remotely I often switch from my mechanical keyboard to my laptop keyboard (for taking notes) because I know how annoying/distracting that sound can be on calls. Suffice it to say, having a gain knob on my mechanical keyboard would be wonderful.
◧◩◪◨⬒⬓
22. whelp_+no[view] [source] [discussion] 2023-08-05 23:57:36
>>TheCle+Nh
that's pretty high when you can use a computer to run the guesses
◧◩◪◨
23. busyan+Pp[view] [source] [discussion] 2023-08-06 00:10:37
>>therei+qc
Or auto-mute upon key press.
replies(2): >>addand+Br >>Aerroo+AB
◧◩◪◨
24. SideQu+cr[view] [source] [discussion] 2023-08-06 00:25:57
>>apendl+8c
95% accuracy means for each stroke, the most likely key is the top choice. Most models return a probability distribution per key, and it's very like the other keys are in the top 2 or 3.

Then you simply have the password cracker start trying passwords ordered by probability, and I bet it breaks your sentence within very few tries.

◧◩◪◨⬒
25. addand+Br[view] [source] [discussion] 2023-08-06 00:30:36
>>busyan+Pp
Alternatively, constant random key press sounds playing in the background.
◧◩◪
26. lamont+Xr[view] [source] [discussion] 2023-08-06 00:33:40
>>jgtros+K9
Don't type your master password on zoom calls
replies(1): >>jerome+kz
◧◩◪
27. barrot+1v[view] [source] [discussion] 2023-08-06 01:01:50
>>kypro+82
Now that I know about the existence of this generation of acoustic attacks I would like to have the possibility to insert a second "master password" different from the main one, that instead of letting me directly access to my passwords just allows me to use fingerprint to get them. Guess if it's already possible
◧◩◪◨
28. tiltow+Aw[view] [source] [discussion] 2023-08-06 01:17:58
>>therei+qc
Some old IBM keyboards (beamsprings, the predecessor to the Model F, which preceded the Model M) had solenoids inside to make them louder and sound more like typewriters. I wonder if such a setup would defeat this attack, or if it would still be possible to discern the actual keypress alongside the solenoid.
replies(2): >>doix+fG >>filche+KP
◧◩◪◨⬒
29. somepl+Ax[view] [source] [discussion] 2023-08-06 01:27:55
>>TheCle+vh
My mechanical keyboard already has a knob that I've configured to control the system audio volume, all that's left is configuring Linux to play an audio recording of a keypress every time I press a key...
replies(2): >>yjftsj+tR >>dasyat+DY
◧◩◪◨
30. jerome+kz[view] [source] [discussion] 2023-08-06 01:44:14
>>lamont+Xr
Or use your fingerprint
replies(1): >>worthl+TT
◧◩◪◨⬒
31. Aerroo+AB[view] [source] [discussion] 2023-08-06 02:11:53
>>busyan+Pp
Or just use a password manager.
◧◩◪
32. Aerroo+SC[view] [source] [discussion] 2023-08-06 02:27:19
>>fatfin+Nb
Microphones are surprisingly sensitive. I can listen to music in my closed-back headset at a regular volume. My desk mic can pick this up. Without boosting the audio it's barely audible that there's music, but after adding some gain you get almost the full song profile (and background noise).

I can even pick out some of my breathing from the recording.

If I turn on noise suppression and noise gate it's fine.

replies(1): >>pests+kO
◧◩◪◨⬒⬓
33. rightb+TD[view] [source] [discussion] 2023-08-06 02:37:45
>>TheCle+Nh
What if the password is typed twice? You can easely figure it out then.
34. hacker+WE[view] [source] 2023-08-06 02:48:26
>>OtherS+(OP)
seems like a very niche case to be warranting the headline and Hackernews front page
◧◩◪◨⬒
35. doix+fG[view] [source] [discussion] 2023-08-06 03:02:49
>>tiltow+Aw
I'm guessing it would be easier (assuming you trained it on that keyboard), because each solenoid would be fairly unique due to manufacturing tolerances. Just my gut feeling, I have no data to back it up.
replies(1): >>Gh0stR+zX
36. dools+5H[view] [source] 2023-08-06 03:11:56
>>OtherS+(OP)
And there are therefore millions of hours of video that could be attack surface area already in the wild
◧◩
37. tharne+PI[view] [source] [discussion] 2023-08-06 03:34:32
>>TechBr+3b
Mechanical keyboard user here. Most of us use mechanical keyboards because they're a lot more fun to type on. That's it. Because if you're not having fun, what's the point?
replies(1): >>coldte+OU
◧◩◪
38. kristo+CL[view] [source] [discussion] 2023-08-06 04:12:13
>>jgtros+K9
[insert yubikey plug]

I don't use one but I know people who swear by them.

Also this is an extremely obvious result. Typing is obviously a form of "penmanship", it was well known that telegraph operators could identify each other by how they tapped out Morse code in the 1800s.

People have been able to do this based upon key stroke latency and even identify people based on habitual mouse patterns for decades.

Audio recordings work as yet another reliable proxy? Shocked!!

I am amazed that people can do such obvious things and get published, have articles written on them... I need to get in on that, sounds easy

I can make a web demo. You turn on the microphone type a couple things into a box on the web browser.

Then you go to a different window and continue typing and then the model predicts What you are typing. As long as it's proper grammar you can get to effectively 100% accuracy. It'll appear to be spooky magic.

I just might take the time.

replies(1): >>mercer+7O
◧◩
39. Spooky+fN[view] [source] [discussion] 2023-08-06 04:37:49
>>TechBr+3b
I used to work in an office space with an independent contractor whose schtick was that he was a genius. The affectations around his genius-ness included casually bringing up Mensa meetings, dropping magazines like Foreign Affairs and academic journals around the office, and his fucking keyboard.

The keyboard had custom switches that were very loud. And he typed fast - it was like living on a gun range. Everyone in the office probably would have chipped in for a hitman, but alas, the CTO, whose office had a solid door, was “inspired” that the mechanical feedback helped fuel inspiration in boy wonder.

Had we thought of the security risks of the keyboard, I would have brought good scotch to the infosec dude while expressing my concerns.

replies(3): >>throwa+TV >>harles+0X >>_the_i+AX
◧◩◪
40. teduna+jN[view] [source] [discussion] 2023-08-06 04:38:57
>>jgtros+K9
What actually are you going to do if you spy on my zoom call and learn my master password is bigjarofpickles?
replies(1): >>Sai_+oP
◧◩◪◨
41. mercer+7O[view] [source] [discussion] 2023-08-06 04:52:16
>>kristo+CL
You sound confident enough that'd I'd like to see you show that off :P.
replies(1): >>kristo+151
◧◩◪◨
42. pests+kO[view] [source] [discussion] 2023-08-06 04:55:44
>>Aerroo+SC
I was two rooms away from someone playing music on a smart Google device. I could very barely hear that music was playing at all and only just barely made out it was a song I had been interested in but kept missing. I pulled out my S22+ and used Shazam. somehow it was able to pick it up easily.
◧◩◪◨
43. Sai_+oP[view] [source] [discussion] 2023-08-06 05:12:31
>>teduna+jN
Hacker: tedunangst, what’s your email? Wanna invite you to that thing!

Hacker: man, I hate typing passwords. Do you use password managers? Any reccos?

… I am become hacker, destroyer of tedunangst’s bank account.

replies(1): >>microt+pV
◧◩◪◨⬒
44. filche+KP[view] [source] [discussion] 2023-08-06 05:19:27
>>tiltow+Aw
Not just limited to old IBM keyboards! The new reproduction Model F keyboards also have a solenoid option! It's fantastically loud with it banging on the solid metal case along with the buckling springs. Great keyboards in general.
◧◩
45. jayd16+nR[view] [source] [discussion] 2023-08-06 05:39:38
>>TechBr+3b
I'll just have to add significantly more background clickity clacks as obfuscation.
replies(1): >>Verdex+vr1
◧◩◪◨⬒⬓
46. yjftsj+tR[view] [source] [discussion] 2023-08-06 05:40:56
>>somepl+Ax
> all that's left is configuring Linux to play an audio recording of a keypress every time I press a key

I unironically think I've seen that config recently - someone had an actually quiet keyboard but wanted the full Mechanical Keyboard Effect™ so they just... have it play the sound per keypress. (It was not 100% clear to me whether it was an elaborate joke or a real aesthetic choice)

replies(1): >>microt+QU
◧◩
47. worthl+FT[view] [source] [discussion] 2023-08-06 06:10:00
>>TechBr+3b
Good luck with my mech steno keyboard.
◧◩◪◨⬒
48. worthl+TT[view] [source] [discussion] 2023-08-06 06:13:18
>>jerome+kz
why is that ?
replies(1): >>microt+xV
◧◩◪
49. coldte+OU[view] [source] [discussion] 2023-08-06 06:28:37
>>tharne+PI
I don't know, typing?

Else, something like Mai Tais on the beach sounds more fun, maybe it's just me...

replies(2): >>whatis+2Z >>vasco+g91
◧◩◪◨⬒⬓⬔
50. microt+QU[view] [source] [discussion] 2023-08-06 06:28:49
>>yjftsj+tR
The Kinesis Advantage2 and the Moonlander have a piezo speaker to give keystroke sounds. However, they are not for, as you might expect to give the full Mechanical Keyboard Effect™.

If you have mechanical switches, you want to learn to type just past the actuation point and not until the switch bottoms out. This is relatively easy with tactile switches (the have a bump and the actuation point is immediately after the bump). However in linear switches, you don't feel when you have hit the actuation point. So the piezo speaker can be used during the first weeks to train your muscle memory of where the actuation point is, so that you can type lightly.

I had this on my Kinesis Advantage with Cherry Reds, and it was really nice during the initial days/weeks, after which I turned it off.

◧◩◪◨
51. coldte+9V[view] [source] [discussion] 2023-08-06 06:33:22
>>apendl+8c
>a sentence-length master password

Ij on-tep of sentenca lentg, it's alio sentemce-bused ("corvect harse batterg stapfe") then ut would be quiti eady to guess even wits worse accurasy.

(If on-top of sentence lenth, it's also sentence-based ("correct horse battery staple") then it would be quite easy to guess even with worse accuracy.)

replies(1): >>Gh0stR+NX
◧◩◪◨⬒
52. microt+pV[view] [source] [discussion] 2023-08-06 06:38:40
>>Sai_+oP
1Password requires an extra key upon the first login that you never have to type afterwards. So, have fun trying to log in to that password manager, even if you have the master password.

Also, you can also use and require a hardware FIDO2 token as second factor.

◧◩◪◨⬒⬓
53. microt+xV[view] [source] [discussion] 2023-08-06 06:41:13
>>worthl+TT
1Password allows unlocking with a fingerprint (Touch ID) or Apple Watch, at least on a Mac. So you can unlock your password manager during a Zoom call, and nobody can snoop your master password.

(With 1Password, the master password is not enough to do a remote account takeover, you also need the second-factor key. And you can't snoop it, since it is only required during the first login, so a user will never type it after that.)

◧◩◪
54. throwa+TV[view] [source] [discussion] 2023-08-06 06:46:39
>>Spooky+fN
Not inspired enough to hire him properly apparently...
◧◩◪
55. harles+0X[view] [source] [discussion] 2023-08-06 07:07:45
>>Spooky+fN
Somewhat tangential: clicky switches, like Cherry Blues, tend to click twice for each stroke. I think this leads to people assuming there are twice as many strokes going on. Tactile switches tend to only click once (when they bottom out). So, fancy keyboards can make people sound faster than they are.
replies(2): >>leni53+L31 >>assbut+8q1
◧◩◪◨⬒⬓
56. Gh0stR+zX[view] [source] [discussion] 2023-08-06 07:16:54
>>doix+fG
I know nothing about this keyboard, but I'd assume it just has one solenoid because the expense and space of 100+ solenoids is impractical if all you're using them for is simulating the vibration/sound of a typewriter.
replies(1): >>doix+gP1
◧◩◪
57. _the_i+AX[view] [source] [discussion] 2023-08-06 07:17:09
>>Spooky+fN
> it was like living on a gun range

Thanks for this metaphor. I know off at least one guy, to which this metaphor could be applied as well.

◧◩◪◨⬒
58. Gh0stR+NX[view] [source] [discussion] 2023-08-06 07:19:30
>>coldte+9V
potential solution: keep a few intentional typos in your passphrases. It also makes dictionary attacks much harder.
replies(1): >>GhostW+nb1
◧◩◪◨⬒⬓
59. dasyat+DY[view] [source] [discussion] 2023-08-06 07:28:57
>>somepl+Ax
You want https://github.com/zevv/bucklespring then.

Lagniappe: “To temporarily silence bucklespring, for example to enter secrets, press ScrollLock twice”

◧◩◪◨
60. whatis+2Z[view] [source] [discussion] 2023-08-06 07:33:29
>>coldte+OU
but mai tais on beach don't get you money, and if you are going to type on something, its better to make sure its comfortable for you.
replies(2): >>sgu999+D71 >>vladva+L91
◧◩◪◨
61. leni53+L31[view] [source] [discussion] 2023-08-06 08:34:43
>>harles+0X
Add a guy that bottoms out the keys and you will have an additional "click".
◧◩
62. marvin+l41[view] [source] [discussion] 2023-08-06 08:39:19
>>TechBr+3b
It’s so fascinating to watch this play out live. Once again, an ambitious kid can implement software hacks that are very funny when used for a joke, but also have massive real-world implications.
◧◩◪◨⬒
63. kristo+151[view] [source] [discussion] 2023-08-06 08:47:29
>>mercer+7O
sounds like a good exercise although it'll literally just be for my own personal amusement. Nobody actually cares about this unless you've got some institutional clout which I do not. Praise for the PhD would be ridicule for you and me.

But really, should be fun ... the laptop dock mic will be great for this. If it's external you're in trouble ... but the researchers just used the onboard so it'll be fine.

◧◩◪◨⬒
64. sgu999+D71[view] [source] [discussion] 2023-08-06 09:23:31
>>whatis+2Z
But inconfortable for others. Surely you all know it bothers a good amount at least some of your colleagues, right?
replies(2): >>coldte+Ee1 >>tharne+yO5
◧◩◪◨
65. vasco+g91[view] [source] [discussion] 2023-08-06 09:40:45
>>coldte+OU
Mai tais on the beach don't let you signal what a cool hacker you are. When the point of a thing is signaling, normal arguments don't apply.
◧◩◪◨⬒
66. vladva+L91[view] [source] [discussion] 2023-08-06 09:47:23
>>whatis+2Z
But isn't one of the reasons for using mechanical switches to be able to not bottom out, hence avoiding the repetitive shocks on the fingers? This is what I do with my tactile keyboards, and I'm actually quieter when I type quickly than my colleagues who bottom out on their cheap hollow HP keyboards like no tomorrow.
replies(1): >>coldte+264
◧◩◪◨⬒⬓
67. GhostW+nb1[view] [source] [discussion] 2023-08-06 10:03:45
>>Gh0stR+NX
now you have to remember the the typos
replies(1): >>coldte+LD2
◧◩◪◨
68. GhostW+vb1[view] [source] [discussion] 2023-08-06 10:05:57
>>bee_ri+E3
which is the point of 2fa – when the 1st factor fails the 2nd holds
◧◩◪◨⬒⬓
69. coldte+Ee1[view] [source] [discussion] 2023-08-06 10:54:44
>>sgu999+D71
Well, not everybody works in an open plan, a shared office, or in an office building.
replies(1): >>swingl+ds1
◧◩◪◨
70. assbut+8q1[view] [source] [discussion] 2023-08-06 12:59:15
>>harles+0X
I don't think that's quite right. Many switches including tactiles will make a sound when the switch tops out, from the stem hitting the housing.

As far as I know, Cherry blues only click once and the second sound you hear on a keypress is just the topping out sound.

https://cdn-blog.adafruit.com/uploads/2016/09/Blue.gif

replies(1): >>surge+2a3
◧◩◪
71. Verdex+vr1[view] [source] [discussion] 2023-08-06 13:09:31
>>jayd16+nR
My thought was to run psyops all the time.

"Just need to type in my password." He says a little too loudly to nobody. Then just type in the honeypot password and login with the real one that you entered with a virtual keyboard a few minutes ago.

Meanwhile you've got a prerecorded keyboard going concurrently that decodes to "I know what you're trying to do. Clever but not clever enough."

And I guess you might as well have a special keyboard that you only use for typing in passwords while you're at it.

◧◩◪◨⬒⬓⬔
72. swingl+ds1[view] [source] [discussion] 2023-08-06 13:14:53
>>coldte+Ee1
Obviously the comment discusses a shared space. If you have your own room you can let your fart rips and sniff them for fun, pull out your dick and piss in a bottle for fun, clank on your loud toys for fun, all the things you should never do with other people around that you might find fun for whatever reason. No one cares. But don't do these things to other people around you, it's anti-social.
◧◩◪◨⬒⬓⬔
73. doix+gP1[view] [source] [discussion] 2023-08-06 15:30:43
>>Gh0stR+zX
I wish I could delete my comment to hide my stupidity. For some reason I was thinking about springs despite reading and typing solenoid. You are of course 100% correct and unfortunately it's too late for me to hide my shame.
◧◩◪◨⬒⬓⬔
74. coldte+LD2[view] [source] [discussion] 2023-08-06 20:13:26
>>GhostW+nb1
Plus, if they can tell what the actual words would be, then brute forcing the typos is trivial
◧◩◪◨⬒
75. surge+2a3[view] [source] [discussion] 2023-08-06 23:37:35
>>assbut+8q1
And they make little o rings to dampen that if you're hardcore.
◧◩
76. WWLink+BZ3[view] [source] [discussion] 2023-08-07 07:21:23
>>TechBr+3b
I fear that "in the name of security" is going to ruin everything.
◧◩◪◨⬒⬓
77. coldte+264[view] [source] [discussion] 2023-08-07 08:12:04
>>vladva+L91
Is it? I've had a few mechanical keyboards, and follow some of those webpages devoted to different switches etc (not obsessively though, once in a blue moon), and I don't recall seeing "bottoming out" and "shocks" as any major benefit mentioned.

I also remember typewriters and old IBM style mechanical keyboards beeing quite heavy to activate, subjectively needing more pressure than some chiclet style "shock" (which I can barely feel).

◧◩◪◨⬒⬓
78. tharne+yO5[view] [source] [discussion] 2023-08-07 18:12:39
>>sgu999+D71
> Surely you all know it bothers a good amount at least some of your colleagues

Quiet switches for the office, clicky switches for home. Not exactly a hard problem to solve :)

[go to top]