← Back to Blog

Beyond CAPTCHAs: Using Keystroke Biometrics to Keep Typing Test Leaderboards Fair in 2026

Beyond CAPTCHAs: Using Keystroke Biometrics to Keep Typing Test Leaderboards Fair in 2026

Why keystroke biometrics are the next step after CAPTCHAs

If you run a typing test site in 2026, you already know: off‑the‑shelf CAPTCHAs are a speed bump, not a stop sign. Communities regularly spot absurd results (think 400–600 WPM sprints) that are almost certainly scripts or auto‑typers rather than humans. (reddit.com)

Keystroke dynamics—how people time key presses and releases—adds a passive, behind‑the‑scenes signal that’s incredibly hard for bots to fake consistently. Recent large‑scale evaluations show verification systems trained on hundreds of thousands of users can reach equal‑error rates (EER) around 3–4% with a single global threshold, and even sub‑1% per‑user with a few short enrollment samples. (arxiv.org)

What the latest benchmarks say (and why that matters)

The KVC‑onGoing keystroke verification challenge aggregates public Aalto keystroke datasets—tweet‑length, free‑text sequences from 185k+ people, captured on both desktop and mobile keyboards. On the evaluation set, state‑of‑the‑art systems achieved about 3.33% EER on desktop and 3.61% on mobile; at a fixed 1% false‑match rate (FMR), the false‑non‑match rate (FNMR) was ~11.96% desktop and ~17.44% mobile. The study also noted age/gender effects that aren’t negligible, underscoring the need to monitor fairness. (arxiv.org)

Type2Branch, a top performer on this benchmark, reports mean per‑subject EERs as low as 0.77% (desktop) and 1.03% (mobile) with five ~50‑character enrollment samples; with a single global threshold, EERs were 3.25% (desktop) and 3.61% (mobile). That’s the kind of accuracy that can quietly filter out most bots without putting honest users through hoops. (arxiv.org)

Earlier, TypeNet demonstrated that deep models scale to internet‑size populations—100k+ users—with only moderate degradation, using the same Aalto data family (over 136 million keystrokes). (arxiv.org)

A practical, privacy‑first anti‑cheat blueprint

Here’s a layered design you can ship today.

1) Passive timing layer (always on, zero friction)

2) Lightweight human check (only on anomalies)

3) Anti‑spoofing (liveness for behavior)

4) Privacy‑by‑design from day one

Desktop vs mobile: tune for the device

Thresholds that feel fair (and how to set them)

Start with ROC/DET curves from your validation set and pick a conservative global threshold that targets very low false positives (FMR). KVC’s public numbers at FMR=1% give a realistic starting point for internet‑scale traffic; in production, you might go tighter (e.g., 0.5%) and accept a higher FNMR knowing that flagged users get a fast human check before any penalty. (arxiv.org)

For fairness, segment performance by device, language, and demographics where available. NIST’s digital identity guidance (draft SP 800‑63‑4) emphasizes measuring FMR across demographic groups and using a fixed threshold; it also urges PAD/liveness in biometric systems—principles that map well to keystroke verification used for anti‑cheat. Treat these as design guardrails, not legal mandates. (pages.nist.gov)

Communicating fairness (and staying within TOS)

Implementation checklist you can copy

The bottom line

You don’t need to replace CAPTCHAs everywhere—just stop leaning on them as your only defense. A privacy‑first keystroke layer, tuned with modern benchmarks and paired with fast, respectful human checks, keeps leaderboards competitive and trustworthy without slowing honest typists down. (arxiv.org)

Article illustration

Ready to improve your typing speed?

Start a Free Typing Test