[email protected]: > == Attack Description == > > Keystroke fingerprinting works by measuring how long keys are pressed > and the time between presses. Its very high accuracy poses a serious > threat to anonymous users.[1]
A while ago, I asked about that on tor-talk: https://lists.torproject.org/pipermail/tor-talk/2015-July/038624.html A suggestion back then was > A keystroke reclocker / normalizer might be better integrated > as part of the keyboard driver in your OS. You'd only need to > code it once, and could tune it to suit you however you want. > Try checking with your OS. which I'd also prefer instead of replicating that feature into every program that communicates with the outside world... Cheers, ~flapflap
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Tails-dev mailing list [email protected] https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to [email protected].
