Logitech extends the mouse HID a bit; the rest is done on the PC side. See:
https://github.com/RobertMe/linux-hid-lg-extended
Reads and writes for small amounts of data. For large updates, maybe use the BOOTSEL style (== explicit user intervention.) Composite HID styles are also possible (but if your device is too, ah, useful then game companies may block it.)
Running user code on a device brings up security issues, sandboxing, CIA hacking [1], etc. Compiled or JITed user code will be more problematic than interpreted scripts. The moment you call it a serious product, a horde of security researchers will jump on it -- those fellows like to write fun papers for Defcon...
[1] For example, infiltrating the keyboard/general I/O controller of a laptop.
https://github.com/RobertMe/linux-hid-lg-extended
Reads and writes for small amounts of data. For large updates, maybe use the BOOTSEL style (== explicit user intervention.) Composite HID styles are also possible (but if your device is too, ah, useful then game companies may block it.)
Running user code on a device brings up security issues, sandboxing, CIA hacking [1], etc. Compiled or JITed user code will be more problematic than interpreted scripts. The moment you call it a serious product, a horde of security researchers will jump on it -- those fellows like to write fun papers for Defcon...
[1] For example, infiltrating the keyboard/general I/O controller of a laptop.
Statistics: Posted by katak255 — Fri Oct 04, 2024 3:31 am