all 1 comments

[–][deleted] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

These kinds of attacks require hardware, software, and often reap bad results. Also, isn’t the internet encrypted these days? Password typing is no longer viewable to a middle man attack because of end to end encryption. Is that correct?