Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

If you can install software on their computer that runs with their authority, you can look to see what keyboard layout is configured and who their ISP is. You can also take pictures of them with their webcam and steal copies of all the passwords they type.


That seems like a pretty big if when dealing with sophisticated attackers.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: