From 5bd1befe74d26f68843391eb76411baa913fd1e5 Mon Sep 17 00:00:00 2001 From: Seirdy Date: Wed, 20 Nov 2024 10:23:23 -0500 Subject: [PATCH] New note: keystroke biometrics --- .../notes/your-keystroke-biometrics-are-everywhere.md | 10 ++++++++++ 1 file changed, 10 insertions(+) create mode 100644 content/notes/your-keystroke-biometrics-are-everywhere.md diff --git a/content/notes/your-keystroke-biometrics-are-everywhere.md b/content/notes/your-keystroke-biometrics-are-everywhere.md new file mode 100644 index 0000000..bf8ec24 --- /dev/null +++ b/content/notes/your-keystroke-biometrics-are-everywhere.md @@ -0,0 +1,10 @@ +--- +title: "Your keystroke biometrics are everywhere" +date: 2024-11-20T10:25:39-05:00 +--- + +Real time collaboration software and text boxes that rapidly save drafts to the cloud essentially log your fingerprintable typing behavior. The industry refers to this information as "keystroke dynamics" or "typing biometrics". + +Other modern "operator signatures" are easier to minimize. A user can learn to [obfuscate writing style](https://seirdy.one/posts/2022/07/09/stylometric-fingerprinting-redux/), or can use keyboard navigation with different pointing devices to limit [fingerprinting of mouse behavior](http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html). + +Keystroke biometrics are difficult to anonymize without [installing software such as kloak](https://github.com/vmonaco/kloak) or browser extensions (the latter of which may add fingerprintable vectors) designed to cloak some of your typing habits. Signature typos, approximate typing speed, etc. will still leak. Alternatively, we could normalize typing messages out in a simple offline editors that don't store revision history before pasting them into other input fields.