Talk:Keystroke dynamics

{{WikiProject banner shell|class=Start|

{{WikiProject Computer Security |importance=High |computing-importance=Low}}

{{WikiProject Mass surveillance |importance=Mid}}

}}

Needs re-write

Interesting article. Needs to be re-written to make more formal and encyclopedic. Now it read too much like an instructional guide. --FloNight 15:25, 4 March 2006 (UTC)

Thank you, I agree

Yep. I wanted to get something in place, even a rough-draft place-holder, while I was hot on the trail of an idea. I'll go back over it and rewrite it.

Wade 17:30, 5 March 2006 (UTC)

Gigaware product

Not sure Type Safe has anything to do with keystroke dynamics- it belongs more under keystroke logging. B.K. 18:16, 25 October 2006 (UTC)

Pressure

TIME says that keystroke authentication includes detecting "the pressure of your fingers on the keys." The author's just making that up, right? 71.252.43.16 21:55, 14 December 2006 (UTC)

Destroying existing security=

This simply reduces the existing security. We spent years enciphering passwords, salting them, shadowing them so that it would be difficult to guess the password.

Now, patterns would have to be kept in plaintext? Today no administrator can know the password of the user (though he can change it or set it to null, he can't know the actual password)

Even if the complete password is not stored in a straightforward way, only triplets,tetralets is stored, the brute force method now requires very few permutations-combinations.

Needs references, neutrality

The assertion is made that whereas behavioural biometrics allow individual FAR thresholds, this is not possible for physical biometrics. I don't believe that it is impossible for physical biometrics. The style suggests a point-of-view that is not neutral.

The example of duress and password sharing is not made clearly.

As already mentioned, the style is more tutorial than summary.

John Y (talk) 21:15, 9 April 2008 (UTC)

Legal and regulatory issues section completely inaccurate

All, I need to take issue with the comment/material that is displayed in the legal section as they are un-based and inaccurate. Yes, key-logging is a privacy invasion and potentially a legal liability, but keylogging is NOT = keystroke dynamics. For one thing Keystroke dynamics does NOT know the contents of what is being typed, such as a userid and password. It only knows how the filed is beign typed (pressure of the keys, dwell time on the keys, the flight time between keys, etc. It is designed to eliminate personally identifiable information from the equation specifically to avoid privacy issues. I would like to edit this section to make it both technically and emotionally accurate. Thanks — Preceding unsigned comment added by Waynersnell (talkcontribs) 18:29, 23 February 2011 (UTC)

Might be a copyvio

I think that this [http://ababasoft.com/typing/articles/typing12[20931].html] is a case of someone copying from wikipedia rather than the other way around. But would appreciate someone double checking for me. Joe (talk) 21:35, 18 April 2018 (UTC)

:As of 5 Mar 2024, the referenced link is dead. MaitiuStiofan (talk) 05:51, 5 March 2024 (UTC)

This page still need to be rewritten, but for new reasons.

When originally drafted the page speculated about the future use of keyboard dynamics for authentication. This was something that was considered in the 1990s but authentication seems to have moved in a different direction. I've added minor edits and reorganization in this direction, but since I'm new to wikipedia, I wanted to tread lightly :) MaitiuStiofan (talk) 06:30, 5 March 2024 (UTC)