[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Profiling Tor users via keystrokes
On Thu, Jul 30, 2015 at 7:36 PM, flapflap <flapflap@xxxxxxxxxx> wrote:
> http://arstechnica.com/security/2015/07/how-the-way-you-type-can-shatter-anonymity-even-on-tor/
> says that apparently it's possible to deanonymise Tor users by analysing
> their keystrokes in input fields of websites.
The came up years ago around SSH.
> Is it valid to assume that such a technique is possible to be deployed
Anything that reads your keystream by char or by chunk could do it.
> Is there need for modifications in the Tor Browser Bundle/upstream Firefox?
A keystroke reclocker / normalizer might be better integrated
as part of the keyboard driver in your OS. You'd only need to
code it once, and could tune it to suit you however you want.
Try checking with your OS.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk