Closed Lvl4Sword closed 2 years ago
Was thinking about this, and can't think of a way to approach devices that AREN'T plugged in. Having a connected whitelist seems like the best way of doing this. The connected whitelist would consist of devices that must be connected 100% of the time. If any of the device(s) are disconnected, or if any devices on the connected whitelist are added again ( Good chance it'd be through spoofing, as it would appear that two of the same devices are plugged in ) the commands the user set would run.
This is the best approach I can think of.
This is something we should definitely deal with at some point. However, I don't think it's a priority until most of the functionality is stable and working across the primary platforms (Linux and Windows).
This is approached in the new branch, and isn't an issue there.
Spoofing is an issue, how do we deal with this?