• The findings are interesting, but the study design is lacking. A single device is used (to be fair, it’s a commonly used device) and as far as I can tell a single person recorded the keystrokes and was assessed. I don’t think it did a good job of simulating trying to train and create a model for someone via recorded audio from a medium such as zoom given many realistic variables like audio quality, being on or off mute, connection quality issues, mic sensitivity, etc. With that being said, it is exposing a theoretical attack vector and I think that’s important to identify and recognize.