This might allow to bypass the “allow microphone” from any qube so not sure Qubes OS actually protects from it, unless it also uses something like keycloak but for mouse too.
For the attack to work, a miscreant must first infect the computer
Qubes should limit attack surface, right? The adversary would have to find a vulnerability to infect sys-usb or dom0. I dont think one can intercept mouse data by infecting my isolated sketchy-malware_disp1841 qube
It’s still much better than having any conventional system, because
Qubes doesn’t necessary pass mouse movements to all qubes all the time, thus there can be significant periods of 0 mouse movement from the attacker’s perspective
Even when it does pass mouse movement, I suspect that it isn’t very precise - sometimes you need to pass a USB device to make certain programs (like CAD and some videogames, for example) work correctly.
As long as an attacker doesn’t control sys-usb and is able to somehow exfiltrate data from it despite lack of network connection, qubes should be resistant.
An attack with a malicious usb drive could be useful here. An attack on sys-usb that manages a USB network interface could be even better.