@jt_rebelo @GossiTheDog Keypress + timing data can be processed to give the exact identity of the keys.
https://www.usenix.org/conference/10th-usenix-security-symposium/timing-analysis-keystrokes-and-timing-attacks-ssh
@ankitpati I know, but using that internally at MS... Everything they collect is one more vector for a blackhat to exploit, but I think (hope) they don't match those telemetry details in-house. @GossiTheDog
@ankitpati I know, but using that internally at MS... Everything they collect is one more vector for a blackhat to exploit, but I think (hope) they don't match those telemetry details in-house. @GossiTheDog