geekhack
geekhack Community => Keyboards => Topic started by: Pacifist on Sat, 15 March 2014, 13:51:22
-
After 60 days:
[attachimg=1]
-
I don't know what this is but I'm downloading it right now.
-
I don't use proprietary keyloggers with logging in the cloud. I advise anyone else to do the same.
-
I don't use proprietary keyloggers with logging in the cloud. I advise anyone else to do the same.
:eek:What program would you recommend then?
-
AFAIK there are several open-source scripts and hardware keylogger firmwares floating around the interwebs. IIRC The_Beast used something like that. Unfortunately, I haven't saved any links, sorry.
I'd like to try something like this, but this particular app is too obviously risky.
-
I used this program http://nemiro.zzsoft.ru/archive/keyboard-statistics
It's purely local.
-
This seems really nice.. Let me just go do a gaming session....
-
Ahhh, this is very interested, I can identify un-needed keys in my board :p .
-
This seems really nice.. Let me just go do a gaming session....
Gimme the lil bug code... please...?
-
With a total uptime of 192 days, 20 hours, 30 minutes, here's mine.
(http://i.imgur.com/lLYQ9en.png)
-
I don't use proprietary keyloggers with logging in the cloud. I advise anyone else to do the same.
ripped open the exe, didn't find a backdoor
so it's probably fine.
-
I think his concern is that some people use facebook to log in... Which in theory I shouldn't have done....
-
This seems really nice.. Let me just go do a gaming session....
Gimme the lil bug code... please...?
Sent.
-
wat.
You have to sign a typical shady EULA/ToS to use it and they require correct real-life personal information. Moreover, they admit they have access to passwords, despite limiting it to specific occasions (don't forget, the ToS may change without prior notice).
It would require some fun with Wireshark to find out, what data get actually sent away in the current software version, and even that wouldn't say much about possible use of steganography.
-
This seems really nice.. Let me just go do a gaming session....
Gimme the lil bug code... please...?
Sent.
Aw, thank you very much. Now I will have my own lil insect snoopying around my posts. yeyyy!
-
i normally have it off a lot of the time because i'm paranoid
(http://i.imgur.com/LOemsWv.png)
-
Just turned it on, and basically just played a LoL game.
[attachimg=1]
-
(https://dl.dropboxusercontent.com/u/99587511/nolife.png)
So yeah... This is from 4:00 to 11:00P.M.
This consists of some Planetside 2, TF2, and GTA IV...
-
I don't use proprietary keyloggers with logging in the cloud. I advise anyone else to do the same.
+1
Technically, in order to have a statistical figure like that, it will record every single key that we type.
It's really scary actually.
I agreed that putting all contents of what we type including passwords of our email account, bank account into a public cloud like this one is not a good idea.
-
It's just a counter.
-
It's just a counter.
That could possibly be counting each keystroke and selling or using the information that you type.
-
It's just a counter.
But in order to count, it must record what we type.
Here is the first scheme that I think of
--- WhatPulse client record what we type ---> send to the cloud ---> at the cloud, it will do the analytics, counting, statistics and compare to what we did on the other days so they can have a general comparison.
The second scheme would be safer
--- WhatPulse client and the cloud only keep a key matrix map between key code versus key hit (key A, hit 100) of what we type, they synchronize together and keep increasing one by one when we hit a key. However, the sequence of it is unsafe. Suppose the previous state of the map is: A:1, B:2, C4, the next state of the map is: A:2, B:4, C:5, the difference can indicate that we already type ABC. I'm not sure if the communication between WhatPulse client and its cloud is encrypted but it would be quite dangerous if it send our key statistics in non-encrypted format. Even it does have encryption, on the cloud, depending on the synchronization mechanism (real time or time frame) and the data recorded, it may still know what we type.
Of course, all of the above are based on my assumption. The application may have difference strategies to protect the customer. But for me, I'm not going to use it. ;D
-
Just installed http://code.google.com/p/logkeys/ and got it running. Now only need to write a script that creates a heatmap out of it.
-
Was cleaning up my laptop keyboard and I couldn't figure out why on earth some random number keys were so much shinier than the others--then I remembered how I type my screen unlock password dozens of times a day without thinking. Even a simple map could potentially be a bad idea.