Research Article

Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing

Figure 5

Distribution of security precautions.