On 2014-04-18, alexander taylor <alexander.j.tay...@jacobs.ucsd.edu> wrote:
>                                         as an example, i could install
> a keylogger on the machines at my school, but this takes more time
> than i have, and leaves a trace that may allow me to get caught.

how long does that really take? swap a keyboard for a similar looking
one with a transmitter in? once installed it just needs to transmit
via radio, so the attacker doesn't need to go back to the machine.

Reply via email to