Use the [[screen keyboard|doc/first_steps/accessibility#keyboard]], if you are using a public computer or worry that the computer might have a keylogger.
Keyloggers are easy to buy and hide on desktop computers but not on laptops. For an example, see <a href="https://www.youtube.com/watch?v=6JJo8qCYE8M">KeeLog: KeyGrabber forensic keylogger getting started</a>.
Firmware includes the BIOS or UEFI and other software stored in electronic chips on the computer.All operating systems, including Tails, depend on firmware to start and run, so no operating system can protect against a firmware attack. In the same way that a car depends on the quality of the road it is driving on, operating systems depend on their firmware.
Firmware attacks have been demonstrated, but are complicated and expensive to perform. We don't know of any actual use against Tails users. For an example, see <a href=https://www.youtube.com/watch?v=sNYsfUNegEA>LegbaCore: Stealing GPG keys/emails in Tails via remote firmware infection</a>.