bancfc@???:
> == Attack Description ==
>
> Keystroke fingerprinting works by measuring how long keys are pressed
> and the time between presses. Its very high accuracy poses a serious
> threat to anonymous users.[1]
A while ago, I asked about that on tor-talk:
https://lists.torproject.org/pipermail/tor-talk/2015-July/038624.html
A suggestion back then was
> A keystroke reclocker / normalizer might be better integrated
> as part of the keyboard driver in your OS. You'd only need to
> code it once, and could tune it to suit you however you want.
> Try checking with your OS.
which I'd also prefer instead of replicating that feature into every
program that communicates with the outside world...
Cheers,
~flapflap