Your idea is genuinely creative, but unfortunately, keystrokes and mouse movements can be faked. AI can now learn and generate synthetic behavioral patterns that mimic human typing rhythms and mouse movements well enough to fool authentication systems. cybersecurityinstitute
Machine learning models, particularly Generative Adversarial Networks (GANs), can be trained on behavioral data to inject continuous streams of synthetic, human-like keystrokes or mouse movements. While behavioral biometrics like keystroke dynamics were once considered "virtually impossible to spoof", the landscape has shifted dramatically. Hackers in 2025 began using AI to defeat continuous authentication systems that rely on these patterns. aratek
Some detection systems do look for "synthetic mouse-move signatures" since automation tools leave fingerprints—bots have no actual Human Interface Device (HID), so everything is emulated. But sophisticated attacks are catching up. humansecurity
The core insight you have—that human mechanical effort is becoming scarce—is exactly what major projects are grappling with:
- World (formerly Worldcoin) uses iris scans via their Orb hardware to create cryptographic proof-of-humanity, processing over 2 million weekly verifications blog.sei
- The challenge isn't just proving humanity but also ensuring the verified human controls what's being submitted—this is why solutions increasingly combine biometrics with device-bound cryptographic keys (like FIDO2/Passkeys) cybersecurityinstitute
Your instinct about keyboards having private keys is actually the direction security is heading. The strongest defense isn't just capturing that someone typed something human-like, but cryptographically proving it happened on a specific, trusted device. Multi-modal approaches combining biometrics with hardware attestation are exponentially harder to fake than any single signal. cybersecurityinstitute
You're right that "proof of AI agent" verification is becoming as critical as proof of humanity—we need to verify not just that humans exist, but which agents are legitimate and who controls them. Your "distance traveled by keystrokes" metric as a fun daily stat is delightful, but as a security primitive, the typing patterns alone have become an arms race between spoofing and detection. mayhem