http://persistent.org/cursorcamouflage.html Cursor Camouflage shows multiple independently moving dummy cursors on the screen so as to make it difficult for an attacker to identify which software key the user is actually typing. The user can identify the real cursor by observing the correlation between the hand motion and the cursor motion, but it is difficult for an attacker to do so because the