> How would you approve the keyboard without using the keyboard?
On laptops the built-in mouse and keyboard would be "trusted".
On desktops and servers, I can think of a couple of strategies:
* Always trust keyboards only when plugged into certain USB ports (e.g. ports on the front of the computer highly visible to the computer's operator)
* Mutual keyboard/host authentication and encryption.