On Wed, 10 Sep 2008, STeve Andre' wrote:

> On Wednesday 10 September 2008 15:58:03 Kevin Neff wrote:
> > Hi,
> >
> > Some secure protocols like SSH send encrypted keystrokes
> > as they're typed.  By doing timing analysis you can figure
> > out which keys the user probably typed (keys that are
> > physically close together on a keyboard can be typed
> > faster).  A careful analysis can reveal the length of
> > passwords and probably some of password itself.
> 
> This is nearly complete bullshit.  For any individual, learning
> their characteristics could give rise to being able to know a
> great deal about what they are doing, but hardly for the 
> general case.

These two sentences contradict one another.

Reply via email to