Talk:Keystroke dynamics
{{WikiProject banner shell|class=Start|
{{WikiProject Computer Security |importance=High |computing-importance=Low}}
{{WikiProject Mass surveillance |importance=Mid}}
}}
Needs re-write
Interesting article. Needs to be re-written to make more formal and encyclopedic. Now it read too much like an instructional guide. --FloNight 15:25, 4 March 2006 (UTC)
Thank you, I agree
Yep. I wanted to get something in place, even a rough-draft place-holder, while I was hot on the trail of an idea. I'll go back over it and rewrite it.
Wade 17:30, 5 March 2006 (UTC)
Gigaware product
Not sure Type Safe has anything to do with keystroke dynamics- it belongs more under keystroke logging. B.K. 18:16, 25 October 2006 (UTC)
Pressure
TIME says that keystroke authentication includes detecting "the pressure of your fingers on the keys." The author's just making that up, right? 71.252.43.16 21:55, 14 December 2006 (UTC)
Destroying existing security=
This simply reduces the existing security. We spent years enciphering passwords, salting them, shadowing them so that it would be difficult to guess the password.
Now, patterns would have to be kept in plaintext? Today no administrator can know the password of the user (though he can change it or set it to null, he can't know the actual password)
Even if the complete password is not stored in a straightforward way, only triplets,tetralets is stored, the brute force method now requires very few permutations-combinations.
Needs references, neutrality
The assertion is made that whereas behavioural biometrics allow individual FAR thresholds, this is not possible for physical biometrics. I don't believe that it is impossible for physical biometrics. The style suggests a point-of-view that is not neutral.
The example of duress and password sharing is not made clearly.
As already mentioned, the style is more tutorial than summary.
Legal and regulatory issues section completely inaccurate
All, I need to take issue with the comment/material that is displayed in the legal section as they are un-based and inaccurate. Yes, key-logging is a privacy invasion and potentially a legal liability, but keylogging is NOT = keystroke dynamics. For one thing Keystroke dynamics does NOT know the contents of what is being typed, such as a userid and password. It only knows how the filed is beign typed (pressure of the keys, dwell time on the keys, the flight time between keys, etc. It is designed to eliminate personally identifiable information from the equation specifically to avoid privacy issues. I would like to edit this section to make it both technically and emotionally accurate. Thanks — Preceding unsigned comment added by Waynersnell (talk • contribs) 18:29, 23 February 2011 (UTC)
External links modified
Hello fellow Wikipedians,
I have just added archive links to {{plural:1|one external link|1 external links}} on Keystroke dynamics. Please take a moment to review [https://en.wikipedia.org/w/index.php?diff=prev&oldid=705329007 my edit]. If necessary, add {{tlx|cbignore}} after the link to keep me from modifying it. Alternatively, you can add {{tlx|nobots|deny{{=}}InternetArchiveBot}} to keep me off the page altogether. I made the following changes:
- Added archive https://web.archive.org/20130718170101/http://verticalcompany.com/ to http://www.verticalcompany.com
When you have finished reviewing my changes, please set the checked parameter below to true to let others know.
{{sourcecheck|checked=false}}
Cheers.—cyberbot IITalk to my owner:Online 21:25, 16 February 2016 (UTC)
External links modified
Hello fellow Wikipedians,
I have just added archive links to {{plural:1|one external link|1 external links}} on Keystroke dynamics. Please take a moment to review [https://en.wikipedia.org/w/index.php?diff=prev&oldid=711176269 my edit]. If necessary, add {{tlx|cbignore}} after the link to keep me from modifying it. Alternatively, you can add {{tlx|nobots|deny{{=}}InternetArchiveBot}} to keep me off the page altogether. I made the following changes:
- Added archive http://web.archive.org/web/20110707084309/http://www.admitonesecurity.com/admitone_library/AOS_Compliance_Functional_Assessment_by_Coalfire.pdf to http://www.admitonesecurity.com/admitone_library/AOS_Compliance_Functional_Assessment_by_Coalfire.pdf
When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at {{tlx|Sourcecheck}}).
{{sourcecheck|checked=false}}
Cheers.—cyberbot IITalk to my owner:Online 09:10, 21 March 2016 (UTC)
Might be a copyvio
I think that this [http://ababasoft.com/typing/articles/typing12[20931].html] is a case of someone copying from wikipedia rather than the other way around. But would appreciate someone double checking for me. Joe (talk) 21:35, 18 April 2018 (UTC)
:As of 5 Mar 2024, the referenced link is dead. MaitiuStiofan (talk) 05:51, 5 March 2024 (UTC)
This page still need to be rewritten, but for new reasons.
When originally drafted the page speculated about the future use of keyboard dynamics for authentication. This was something that was considered in the 1990s but authentication seems to have moved in a different direction. I've added minor edits and reorganization in this direction, but since I'm new to wikipedia, I wanted to tread lightly :) MaitiuStiofan (talk) 06:30, 5 March 2024 (UTC)