Hacker Newsnew | past | comments | ask | show | jobs | submit | magicseth's commentslogin

I am engaging with this seriously! I don't know if there will be any real solution. But I think it's worth exploring.


If apple approves it, ive got a solution: A keyboardthat attests to your humanity https://typed.by/magicseth/2451#2NyGLfAQxmqRiAOTlaX7ma3G4d1o...


Brilliant! Just the thing we want: more hardware attestation, more deanonymization, less user control, all diligently orchestrated in a repository where the only contributor is Anthropic Claude [0]. Comes complete with a misaligned ASCII diagram in the README to show how much effort the humans behind it put in!

Yes, even their "humanifesto" is LLM output, and is written almost exclusively in the "it's not X <emdash> it's Y" style.

[0]: https://github.com/magicseth/keywitness/graphs/contributors


Those are all situationally-valid criticisms, but I've long thought the ability to have smartphones' cameras cryptographically sign photos is good when available. The use case is demonstrating a photo wasn't doctored, and that it came from a device associated with e.g. a journalist, who maintains a public key. Of course, it should be optional.


Yes! That's what I'm getting at. This protocol optionally allows you to sign with your private key, but you don't have to for the protocol to provide utility. It could just be enough to say "if you trust magicseth's binary and apple, then this was typed one letter at a time"

There's nothing stopping folks from typing a message an LLM wrote one at a time, but the idea of increasing the human cost of sending messages is an interesting one, or at least I thought :-(


The problem is that it's not optional to end-users if sites enforce its use.


The other problem is that the device or company might decide not to attest for you.

For instance, the employee at Apple that decided to pull ICE Block from the store could decide that the "admissible in court" bit should be false if it looks like a police officer is in frame.

Similarly, the keyboard could decide your social credit score is too low, and just stop attesting. A court could order this behavior.

Or, you could fail mandatory age / id verification because your credit card expired, and then all the above + more could happen! Good luck getting through to credit card tech support at that point...


Hi! I want anonymity! I also want to be able to prove what level of effort has been put in to something. I think there's room for both. This is an encrypted proof that I wrote something on a keyboard that tracks fingers. The protocol allows you to optionally sign it with your identity, but that isn't strictly required.

It is an attempt at putting something into the conversation more than just "OSS is broken because there are too many slop PRs." What if OSS required a human to attest that they actually looked at the code they're submitting? This tool could help with that.

Yes LLMs were used greatly in the production of this prototype!

It doesn't change the goal of the experiment! or it's potential utility! Do you see any potential area in your world where some piece of this is valuable?


> Yes, even their "humanifesto" is LLM output, and is written almost exclusively in the "it's not X <emdash> it's Y" style.

....no. There's not a single occurrence of that.

https://keywitness.io/manifesto

There are six emdashes on that page. NONE of them are "it's not X it's why".

> Emails, messages, essays, code reviews, love letters — all suspect.

> We believe this can be solved — not by detecting AI, but by proving humanity.

> KeyWitness captures cryptographic proof at the point of input — the keyboard.

> When you seal a message, the keyboard builds a W3C Verifiable Credential — a self-contained proof that can be verified by anyone, anywhere, without trusting us or any central authority.

> That's an alphabet of 774 symbols — each carrying log2(774) ≈ 9.6 bits. 27 emoji for 256 bits.

> They're a declaration: this message was written by a person — one of the diverse, imperfect, irreplaceable humans who still choose to type their own words.

Clarifications: 4

Continuation from a list: 1

Could just be a comma: 1

"It's not X -- it's Y": 0.

If you're going to make lazy commentary about good writing being AI, please at least be sure that you're reading the content and saying accurate things.


It is largely written by iteration with an LLM! No need to speculate or analyze em dashes :-)

The emoji idea was mine. I like it :-) unfortunately it doesn't work in places like HN that strip out emoji. So I had to make a base64 encoding option.

The goal was to create an effective encryption key for the url hash (so it doesn't get sent to the server). And encoding skin tone with human emojis allows a super dense bit/visual character encoding that ALSO is a cute reference to the humans I'm trying to center with this project!


> We believe this can be solved — not by detecting AI, but by proving humanity

“It's not X -- it's Y": 1


It's either a bot, or someone who writes exactly like a bot. I don't care which it is, both go to the discard pile.


phew!


It’s a product for people who need help telling whether text was written by AI.

Maybe they deliberately write it like that, to filter out people who aren’t the target market?


From their “how it works” page:

> The server stores an encrypted blob it can't decrypt. We couldn't read your messages even if we wanted to. That's not a policy — it's math.

If you can’t tell that this is AI slop then maybe KeyWitness does solve a real problem after all.


<redacted because my friend posted it but accidentaly used my account>


Oh you think it's stupid? It was an attempt to encode an encryption key that isn't sent to the server in a way that is minimally invasive. The skintone emomis allow pretty high byte density, and also are cute!

Sorry it doesn't meet your needs.

There is irony in having an ai generated humanifesto. Could it be intentional? hmm?

Is there no irony in deriding a project for being potentially LLM generated, when it's goal is to aide people in differentiating? :shrug:


Oh Gawd, not this idea again!

This idea of capturing the timing of people's keystrokes to identify them, ensure it is them typing their passwords, or even using the timing itself as a password has been recurring every few years for at least three decades.

It is always just as bad. Because there are so many cases where it completely fails.

The first case is a minor injury to either hand — just put a fat bandage on one finger from a minor kitchen accident, and you'll be typing completely differently for a few days.

Or, because I just walked into my office eating a juicy apple with one hand and I'm in a hurry typing my PW with my other hand because someone just called with an urgent issue I've got to fix, aaaaannnd, your software balks because I'm typing with a completely different cadence.

The list of valid reasons for failure is endless wherein a person's usual solid patterns are good 90%+ of the time, but will hard fail the other 10% of the time. And the acceptable error rate would be 2-4 orders of magnitude less.

It's a mystery how people go all the way to building software based on an idea that seems good but is actually bad, without thinking it through, or even checking how often it has been done before and failed?


That's not what this is. at all.


You might want to check out “How it Works” on the site as none of what you said applies: https://typed.by/how


Then why does your link claim the following?

> While you type, the keyboard quietly records how you type — the rhythm, the pauses between keys, where your finger lands, how hard you press.

> Nobody types the same way. Your pattern is as unique as your handwriting. That's the signal.


I’m sceptical about this idea but, to give it full credit, it’s a custom piece of hardware that would presumably be more accurate than previous software-only attempts. Maybe it will actually work this time, idk, although I still don’t really see the point.


Vibe copy is a hell of a drug.


Yes. This is from that page:

>>While you type, the keyboard quietly records how you type — the rhythm, the pauses between keys, where your finger lands, how hard you press.

>>Nobody types the same way. Your pattern is as unique as your handwriting. That's the signal.

This very precisely makes my point:

Yes, the typing pattern of any human is highly and possibly even completely unique to that human — UNTIL any of a myriad of everyday issues makes it falsely deny access because the human's typing pattern has changed in a way the human can't do anything to fix at the moment.

If you are only attempting to distinguish a human from an automated system, it'll be better, until someone just starts recording the same patterns and re-playing them to this upstream process; then its a mere race to who can get their hooks in at a lower level. And someone is always going to say: "Oh, this system can identify the specific human", and we're off to the races again.

So, no. Unless you can account for ALL of the reasonable everyday failure modes, typing with either hand, any finger or combination of fingers out of commission for a minute or a lifetime, this idea will fail.


IOW, if you are doing this, it does not matter what you are doing afterwards.

You are assuming that a human's particular typing pattern is consistent, when the fact is that any number of ordinary events will render your assumption false (one or more fingers bandaged, sprained, whatever, or one hand occupied ATM).

This is not a hardware or software problem, and no amount of code, hardware, or cleverness will fix it; this is a fundamental mismatch between your assumption vs reality.


can confirm. am weird enough to routinely flag as "inhuman".

thaaaaaaaaanks


The first widely distributed and open source version of this typist timing validation idea I saw (and incorporated into my own software at the time) was released by Michael Crichton as part of a password 2nd-factor checker (1st factor a known phrase or even your name, the 2nd factor being your idiosyncratic typing pattern) in Creative Computing magazine that printed the code.

Original here: https://archive.org/details/sim_creative-computing_1984-06_1...


You’re getting a negative reaction from others but I share this feedback in good faith: I don’t understand what problem your product is supposed to solve.

Yeah I guess the cryptographic stuff sounds vaguely impressive although it’s been a long time since I had to think about cryptography in detail. But what is this _for_? I’m going to buy an expensive keyboard so that I can send messages to someone and they’ll know it’s really me – but it has to be someone who a) doesn’t trust me or any of our existing communication channels and b) cares enough to verify using this weird software? Oh and it’s important they know I sent it from a particular device out of the many I could be using?

Who is that person? What would I be sending them? What is the scenario where we would both need this?

Also the server can’t read the message but the decryption key is in the URL? So anyone with the URL can still read it? Then why even bother encrypting it?

Maybe this is one of those cases where I’m so far outside your target market that it was never supposed to make sense to me but I feel like I’m missing something here. Or maybe you need to work on your elevator pitch.

Just sharing my honest reaction.


Somewhere there is someone 3D printing a keyboard cover that an llm can type with.


I'm actually building a physical keyboard for those people who don't have iphones! Though given the reaction I'm seeing here, I probably won't share it with this audience :-P it has capacitive keys, a secure enclave, and a fingerprint sensor.


Please do share. This sort of tech is necessary, for better or worse, and I'd have a bunch of use cases in mind for it!


This does not prove anything and it is only avalible to users with X.com accounts (you need a X.com account to download the app).


Hi! You don't need an x.com account to download, that's just the easiest way to dm me. If you're actually interested, I can let you try it! The source is also available.

It proves 1) that an apple device with a secure enclave signed it. 2) that my app signed it.

If you trust the binary I've distributed is the same as the one on the app store, then it also proves: 3) that it was typed on my keyboard not using automation (though as others have mentioned, you could build a capacitive robot to type on it) 4) that the typer has the same private key as previous messages they've signed (if you have an out of band way to corroborate that's great too) 5) optionally, that the person whose biometrics are associated with the device approved it.

There is also an optional voice to text mode that uses 3d face mesh to attempt to verify the words were spoken live.

Not every level of verification is required by the ptrotocol, so you could attest that it was written on a keyboard, but not who wrote it (not yet implemented in the client app).

The protocol doesn't require you to run my app, if you compile it yourself, you can create your own web of trust around you!


>that an apple device with a secure enclave signed it.

What Apple devices are supported? All I have is a iPhone 4 running a old iOS version(pre iOS 7) (which I will not update and I don't think has a secure enclave) and a M1 mac mini and some lightning earpods and a apple thunderbolt display and some USB-A chargers and some old MacBooks.

I saw something about android (https://typed.by/manifesto#:~:text=Android,Integrity) on the website, but it mentioned Play Integrity which I do not have becuase I use LineageOS for MicroG.

I think that the concept is stupid becuase it would require to somehow prove that the app is not modified(which is impractical) and there is no stylus on a motor or fake screen(which is also impractical).

I think that a better aproach would be to form a Web Of Trust where only people's (not just humans, this would include all animals and potentially aliens but no clankers) certificates are signed, but with a interface that is friendly to people who are not very into technology but with some sort of way to not have who your friends are revealed, but this would still allow someone to get a attestation for their robot.


Why 256-bit key AES? It brings nothing but longer key. 128-bit is more than enough. Please don't mention PQC :fire:


"why do you need more compute resources? Please don't mention computer programs"


Just as shipwrecks before the advent of nuclear bombs are a source of low background radiation, troves of content like this are low-ai-contamination sources of guaranteed human media.

I suspect they might someday be valuable :-)


Don't worry, AI can add a filter that makes new stuff look like old human media.


We built hellowonder.ai as a PWA first, and it was almost amazing! But we use voice input, and ios would pop up the microphone permission repeatedly after a few minutes, even if it had been approved recently. I couldn't figure out how to keep the microphone permission!

So frustrating to be soooo close, and then need to build an iOS app.


Well, it's part chat bot, so I don't know if it meets your criteria. But we're using them for a LOT of things behind the scenes to help kids find content they love that their parents approve of.

[HelloWonder.ai](Hellowonder.ai)

The front end looks like a chat bot, but on the backend we're using LLMs to find, parse, rate, classify, and rephrase content on the fly for individuals.


We are tackling this at hellowonder.ai . I took what I learned building ai tools at Google and built a system that does more than just block bad content for kids. It helps kids find exciting content that is aligned with their parents, effectively allowing them much more freedom.

It’s amazing how this system actually brings kids and parents closer together in practice.

Email seth@ that domain if you have kids and would like to skip the waitlist.


Sounds like a really interesting system but the devil's in the details. I really don't see how you solve this without some combination of layer 3 filtering and individual kernel level apps for all supported devices.


Does this work for Android? I'd be interested but we have only Android and desktop Linux devices


Awesome! Thank you for sharing. Here’s a tiny little feature idea I’ve always wanted: when a link opens a new tab, the back button should close the tab and take you back where you were!

Congratulations on launching!


(For what it’s worth, Safari on iOS does that)


Absolutely! That's something I would like to implement as well.


It does, but it’s really quirky! Any browser getting it right without so many weird quirks would be a compelling option for me.


In addition, it would be great if after going back that way there would be a way to go forward again (= undo the going back and closing the tab), in particular if the tab one has returned to has no other forward history. I frequently miss this in Safari.


thedad.blog


I'm genuinely curious how you would classify my product, Wonder an AI powered browser for kids: hellowonder.ai

Does it cross the threshold?


Yeah I'll raise my hand here to say I did a file manager that automates file management tasks by using AI to write Bash scripts (Aerome.net). It's still super primitive though, if I'm being honest. I think the problem is that it's way harder to write a cross platform file manager, or browser wrapper in your case, then it is to write a chat interface on top of ChatGPT. I suspect in a year or two many good use cases will emerge, as people write more complicated software to take advantage of LLM's capabilities.

I'm going to check out you're browser thing later tonight, it looks good!


I believe we can use AI here :-) It is suddenly scalable to help kids develop critical thinking skills live in real time.

I've got 5 year olds, 8, 10 and a 12 year old, and they've been my beta testers for Wonder [0].

It uses AI to help direct kids towards positive content online, and defers to me to help my oldest navigate this tricky online world.

Let me know if you have kids and would like to try it out!

[0] https://gotwonder.com


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: