On Wed, 10 Sep 2008, STeve Andre' wrote: > On Wednesday 10 September 2008 15:58:03 Kevin Neff wrote: > > Hi, > > > > Some secure protocols like SSH send encrypted keystrokes > > as they're typed. By doing timing analysis you can figure > > out which keys the user probably typed (keys that are > > physically close together on a keyboard can be typed > > faster). A careful analysis can reveal the length of > > passwords and probably some of password itself. > > This is nearly complete bullshit. For any individual, learning > their characteristics could give rise to being able to know a > great deal about what they are doing, but hardly for the > general case.
These two sentences contradict one another.