Ben S on Twitter: "Built it using two #RaspberryPi pico dev boards. One acts as a USB HID keyboard device for the computer and one acts as a USB host to read
![Massive, undetectable security flaw found in USB: It's time to get your PS/2 keyboard out of the cupboard - ExtremeTech Massive, undetectable security flaw found in USB: It's time to get your PS/2 keyboard out of the cupboard - ExtremeTech](https://www.extremetech.com/wp-content/uploads/2013/12/usbplugs-640x353.jpg)
Massive, undetectable security flaw found in USB: It's time to get your PS/2 keyboard out of the cupboard - ExtremeTech
USB HID Attacks. USB HID devices are the way we interact… | by evildaemond | Heck the Packet | Medium
![USB HID Attacks. USB HID devices are the way we interact… | by evildaemond | Heck the Packet | Medium USB HID Attacks. USB HID devices are the way we interact… | by evildaemond | Heck the Packet | Medium](https://miro.medium.com/max/1400/1*GfOV-UiAQ_vtr4qfB9fBkQ.jpeg)