[email protected]:
> == Attack Description ==
> 
> Keystroke fingerprinting works by measuring how long keys are pressed
> and the time between presses. Its very high accuracy poses a serious
> threat to anonymous users.[1]

A while ago, I asked about that on tor-talk:
https://lists.torproject.org/pipermail/tor-talk/2015-July/038624.html

A suggestion back then was

> A keystroke reclocker / normalizer might be better integrated
> as part of the keyboard driver in your OS. You'd only need to
> code it once, and could tune it to suit you however you want.
> Try checking with your OS.

which I'd also prefer instead of replicating that feature into every
program that communicates with the outside world...

Cheers,
~flapflap

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Tails-dev mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to