Analysis of Instant Message traffic and its susceptibility to keystroke analysis timing to bypass encryption. Includes all files needed to replicate the experiment and some of the final raw results.