<div style="font-family: Arial, sans-serif; font-size: 14px;">Thanks all for a great welcome back, it felt like I hadn't been away in London for years!<br><br>During our discussions tonight, Seb was interested in how my USB Rubber Ducky was able to exfiltrate files via a keystroke reflection, and I remembered there's a whitepaper about it here - <span><a target="_blank" rel="noreferrer nofollow noopener" href="https://cdn.shopify.com/s/files/1/0068/2142/files/hak5-whitepaper-keystroke-reflection.pdf?v=1659317977">https://cdn.shopify.com/s/files/1/0068/2142/files/hak5-whitepaper-keystroke-reflection.pdf?v=1659317977</a></span></div><div style="font-family: Arial, sans-serif; font-size: 14px;"><br></div><div style="font-family: Arial, sans-serif; font-size: 14px;">Hopefully that helps answer some questions for you Seb!</div><div style="font-family: Arial, sans-serif; font-size: 14px;"><br></div><div style="font-family: Arial, sans-serif; font-size: 14px;">— Andrew</div>
<div class="protonmail_signature_block protonmail_signature_block-empty" style="font-family: Arial, sans-serif; font-size: 14px;">
    <div class="protonmail_signature_block-user protonmail_signature_block-empty"></div>
    
            <div class="protonmail_signature_block-proton protonmail_signature_block-empty">
        
            </div>
</div>