{"video_id":"52WufHfjGP4","title":"Could a Keylogger Be Spying on You?","channel":"Techquickie","show":"Techquickie","published_at":"2019-05-06T14:58:16Z","duration_s":310,"segments":[{"start_s":0.0,"end_s":1.4,"text":"Thanks for watching Techquickie.","speaker":null,"is_sponsor":0},{"start_s":1.4,"end_s":2.68,"text":"Click the subscribe button,","speaker":null,"is_sponsor":0},{"start_s":2.68,"end_s":4.96,"text":"then enable notifications with the bell icon","speaker":null,"is_sponsor":0},{"start_s":4.96,"end_s":7.12,"text":"so you won't miss any future videos.","speaker":null,"is_sponsor":0},{"start_s":7.12,"end_s":10.02,"text":"All right, so you're a privacy conscious individual.","speaker":null,"is_sponsor":0},{"start_s":10.02,"end_s":12.12,"text":"You've got two factor on all your accounts.","speaker":null,"is_sponsor":0},{"start_s":12.12,"end_s":14.26,"text":"You use a reputable VPN service,","speaker":null,"is_sponsor":0},{"start_s":14.26,"end_s":16.8,"text":"and you even watched our earlier episode on","speaker":null,"is_sponsor":0},{"start_s":16.8,"end_s":20.2,"text":"what your ISP knows about you.","speaker":null,"is_sponsor":0},{"start_s":20.2,"end_s":22.02,"text":"But what if there was something lurking","speaker":null,"is_sponsor":0},{"start_s":22.02,"end_s":25.18,"text":"on your computer itself that could spill","speaker":null,"is_sponsor":0},{"start_s":25.18,"end_s":31.58,"text":"all of your secrets in spite of your precautions?","speaker":null,"is_sponsor":0},{"start_s":31.58,"end_s":34.48,"text":"I'm talking, of course, about a keystroke logger","speaker":null,"is_sponsor":0},{"start_s":34.48,"end_s":37.64,"text":"or keylogger, a nefarious type of program","speaker":null,"is_sponsor":0},{"start_s":37.64,"end_s":39.94,"text":"that does exactly what it sounds like.","speaker":null,"is_sponsor":0},{"start_s":39.94,"end_s":44.36,"text":"It logs every button you press on your keyboard.","speaker":null,"is_sponsor":0},{"start_s":44.36,"end_s":46.72,"text":"And while sometimes these can be used","speaker":null,"is_sponsor":0},{"start_s":46.72,"end_s":49.62,"text":"for legitimate purposes like parental monitoring","speaker":null,"is_sponsor":0},{"start_s":49.62,"end_s":53.68,"text":"or language research, they also make it child's play","speaker":null,"is_sponsor":0},{"start_s":53.68,"end_s":56.38,"text":"to steal passwords and search history","speaker":null,"is_sponsor":0},{"start_s":56.38,"end_s":60.06,"text":"or even spy on emails to your significant other.","speaker":null,"is_sponsor":0},{"start_s":60.06,"end_s":60.9,"text":"Yikes.","speaker":null,"is_sponsor":0},{"start_s":60.9,"end_s":61.56,"text":"And because a keystroke logger","speaker":null,"is_sponsor":0},{"start_s":61.56,"end_s":64.54,"text":"or keylogger's principle of operation is so simple,","speaker":null,"is_sponsor":0},{"start_s":64.54,"end_s":67.16,"text":"they're easy to code, easy to deploy","speaker":null,"is_sponsor":0},{"start_s":67.16,"end_s":71.78,"text":"in a wide variety of situations, and easy to hide.","speaker":null,"is_sponsor":0},{"start_s":71.78,"end_s":73.14,"text":"Once you get infected,","speaker":null,"is_sponsor":0},{"start_s":73.14,"end_s":75.44,"text":"often by clicking on a compromised link,","speaker":null,"is_sponsor":0},{"start_s":75.44,"end_s":78.74,"text":"software keyloggers can live just about anywhere,","speaker":null,"is_sponsor":0},{"start_s":78.74,"end_s":81.62,"text":"operating inside a script on the webpage itself,","speaker":null,"is_sponsor":0},{"start_s":81.62,"end_s":83.84,"text":"injecting themselves into the memory space","speaker":null,"is_sponsor":0},{"start_s":83.84,"end_s":86.56,"text":"used by your programs to make them hard to detect,","speaker":null,"is_sponsor":0},{"start_s":86.56,"end_s":88.82,"text":"or even getting into the code","speaker":null,"is_sponsor":0},{"start_s":88.82,"end_s":91.1,"text":"of your operating system itself as a root kit","speaker":null,"is_sponsor":0},{"start_s":91.1,"end_s":94.82,"text":"or by posing as a keyboard driver.","speaker":null,"is_sponsor":0},{"start_s":94.82,"end_s":97.18,"text":"By the way, root kits are nefarious little bastards.","speaker":null,"is_sponsor":0},{"start_s":97.18,"end_s":99.5,"text":"You can learn more about those up here.","speaker":null,"is_sponsor":0},{"start_s":99.5,"end_s":102.82,"text":"Making matters worse, unless you can see the keylogger","speaker":null,"is_sponsor":0},{"start_s":102.82,"end_s":105.9,"text":"in the background or in your notification tray,","speaker":null,"is_sponsor":0},{"start_s":105.9,"end_s":109.3,"text":"or you're like noticing obvious delays in the keystrokes","speaker":null,"is_sponsor":0},{"start_s":109.3,"end_s":111.24,"text":"that aren't explained by anything else,","speaker":null,"is_sponsor":0},{"start_s":111.24,"end_s":114.66,"text":"it is really difficult to know if you have one installed.","speaker":null,"is_sponsor":0},{"start_s":114.66,"end_s":116.98,"text":"Defeating them can sometimes even require","speaker":null,"is_sponsor":0},{"start_s":116.98,"end_s":121.18,"text":"specialized anti-malware software that is designed to protect","speaker":null,"is_sponsor":0},{"start_s":121.2,"end_s":123.12,"text":"against logging software.","speaker":null,"is_sponsor":0},{"start_s":123.12,"end_s":125.58,"text":"So you might want to consider that if you're really concerned","speaker":null,"is_sponsor":0},{"start_s":125.58,"end_s":127.52,"text":"that someone might be spying on you.","speaker":null,"is_sponsor":0},{"start_s":127.52,"end_s":129.62,"text":"And while you're at it,","speaker":null,"is_sponsor":0},{"start_s":129.62,"end_s":132.08,"text":"you might want to check the back of your PC too.","speaker":null,"is_sponsor":0},{"start_s":132.08,"end_s":135.14,"text":"Fortunately, these are usually pretty easy to spot,","speaker":null,"is_sponsor":0},{"start_s":135.14,"end_s":138.44,"text":"but hardware keyloggers also exist,","speaker":null,"is_sponsor":0},{"start_s":138.44,"end_s":142.2,"text":"often as a dongle that sits between your keyboard cable","speaker":null,"is_sponsor":0},{"start_s":142.2,"end_s":144.52,"text":"and the USB port on your computer.","speaker":null,"is_sponsor":0},{"start_s":144.52,"end_s":147.02,"text":"These can be especially troublesome in settings","speaker":null,"is_sponsor":0},{"start_s":147.02,"end_s":150.92,"text":"where people might not be able to see the back of the PC,","speaker":null,"is_sponsor":0},{"start_s":151.2,"end_s":154.16,"text":"like in a library or an office.","speaker":null,"is_sponsor":0},{"start_s":154.16,"end_s":157.06,"text":"And depending on how valuable your work is,","speaker":null,"is_sponsor":0},{"start_s":157.06,"end_s":159.72,"text":"even that might not be enough.","speaker":null,"is_sponsor":0},{"start_s":159.72,"end_s":162.82,"text":"There have been cases of hardware keyloggers","speaker":null,"is_sponsor":0},{"start_s":162.82,"end_s":167.14,"text":"being embedded inside a keyboard by a determined snoop,","speaker":null,"is_sponsor":0},{"start_s":167.14,"end_s":170.8,"text":"and then either retrieved wirelessly using a transmitter","speaker":null,"is_sponsor":0},{"start_s":170.8,"end_s":174.64,"text":"or physically by going back and digging it back out later.","speaker":null,"is_sponsor":0},{"start_s":174.64,"end_s":178.24,"text":"It's also even possible for keyloggers to sniff","speaker":null,"is_sponsor":0},{"start_s":178.24,"end_s":181.2,"text":"the sometimes unencrypted connection","speaker":null,"is_sponsor":0},{"start_s":181.2,"end_s":184.4,"text":"between a wireless keyboard and the PC","speaker":null,"is_sponsor":0},{"start_s":184.4,"end_s":187.84,"text":"to snatch keystrokes out of the air.","speaker":null,"is_sponsor":0},{"start_s":187.84,"end_s":189.96,"text":"And we're not done yet.","speaker":null,"is_sponsor":0},{"start_s":189.96,"end_s":192.84,"text":"Now this is some real James Bond level stuff right here.","speaker":null,"is_sponsor":0},{"start_s":192.84,"end_s":197.32,"text":"It's also possible to record the sounds that you make","speaker":null,"is_sponsor":0},{"start_s":197.32,"end_s":198.94,"text":"as you press each key,","speaker":null,"is_sponsor":0},{"start_s":198.94,"end_s":202.76,"text":"and use the fact that each key will sound slightly different","speaker":null,"is_sponsor":0},{"start_s":202.76,"end_s":207.66,"text":"based on its position to reconstruct what you typed.","speaker":null,"is_sponsor":0},{"start_s":207.66,"end_s":209.42,"text":"Then if that's not crazy enough,","speaker":null,"is_sponsor":0},{"start_s":209.42,"end_s":211.42,"text":"security researchers have found","speaker":null,"is_sponsor":0},{"start_s":211.42,"end_s":213.86,"text":"that keyboards give off different frequencies","speaker":null,"is_sponsor":0},{"start_s":213.86,"end_s":216.98,"text":"of radio waves when different keys are pressed,","speaker":null,"is_sponsor":0},{"start_s":216.98,"end_s":220.74,"text":"and can even trigger smartphone accelerometers","speaker":null,"is_sponsor":0},{"start_s":220.74,"end_s":223.94,"text":"strongly enough to discern different keystrokes","speaker":null,"is_sponsor":0},{"start_s":223.94,"end_s":226.56,"text":"if it's sitting close enough to your keyboard.","speaker":null,"is_sponsor":0},{"start_s":228.25,"end_s":229.71,"text":"So I think all of this is enough","speaker":null,"is_sponsor":0},{"start_s":229.71,"end_s":231.53,"text":"to make pretty much anyone paranoid,","speaker":null,"is_sponsor":0},{"start_s":231.53,"end_s":233.67,"text":"but I do have some good news.","speaker":null,"is_sponsor":0},{"start_s":233.67,"end_s":236.55,"text":"Unless some spy agency is after you,","speaker":null,"is_sponsor":0},{"start_s":236.55,"end_s":238.99,"text":"your best bet is to just take a quick glance","speaker":null,"is_sponsor":0},{"start_s":238.99,"end_s":240.75,"text":"at your cable every now and then","speaker":null,"is_sponsor":0},{"start_s":240.75,"end_s":242.97,"text":"if you're using a PC in a shared environment,","speaker":null,"is_sponsor":0},{"start_s":242.97,"end_s":245.01,"text":"run good anti-malware software,","speaker":null,"is_sponsor":0},{"start_s":245.01,"end_s":250.01,"text":"and as always, stay away from shady links.","speaker":null,"is_sponsor":0},{"start_s":252.24,"end_s":256.5,"text":"PIA VPN supports multiple protocols and encryption levels,","speaker":null,"is_sponsor":0},{"start_s":256.5,"end_s":259.56,"text":"which allows you to dial in the exact level of protection","speaker":null,"is_sponsor":0},{"start_s":259.56,"end_s":260.46,"text":"that you need.","speaker":null,"is_sponsor":0},{"start_s":260.46,"end_s":263.42,"text":"You can run it on up to five devices at once,","speaker":null,"is_sponsor":0},{"start_s":263.42,"end_s":267.9,"text":"and they've got apps for Windows, Mac, Android, iOS, Linux,","speaker":null,"is_sponsor":0},{"start_s":267.9,"end_s":271.46,"text":"and even a Chrome extension with support for more platforms,","speaker":null,"is_sponsor":0},{"start_s":271.46,"end_s":272.42,"text":"and they're coming soon.","speaker":null,"is_sponsor":0},{"start_s":272.42,"end_s":274.02,"text":"They've got lots of great features,","speaker":null,"is_sponsor":0},{"start_s":274.02,"end_s":277.08,"text":"so in addition to being able to bypass geo-restrictions","speaker":null,"is_sponsor":0},{"start_s":277.08,"end_s":278.72,"text":"and censorship by making you appear","speaker":null,"is_sponsor":0},{"start_s":278.72,"end_s":280.52,"text":"as though you're connecting from somewhere else,","speaker":null,"is_sponsor":0},{"start_s":280.52,"end_s":283.54,"text":"you can also block unwanted connections to prevent attacks,","speaker":null,"is_sponsor":0},{"start_s":283.54,"end_s":286.3,"text":"auto-block all traffic if the VPN disconnects,","speaker":null,"is_sponsor":0},{"start_s":286.3,"end_s":290.5,"text":"and it even includes MACE, PIA's built-in malware blocker.","speaker":null,"is_sponsor":0},{"start_s":290.5,"end_s":291.64,"text":"So what are you waiting for?","speaker":null,"is_sponsor":0},{"start_s":291.64,"end_s":295.14,"text":"Check out PIA at the link in the video description.","speaker":null,"is_sponsor":0},{"start_s":295.14,"end_s":295.98,"text":"So thanks for watching, guys.","speaker":null,"is_sponsor":0},{"start_s":295.98,"end_s":297.36,"text":"Like, dislike, check out our other channels,","speaker":null,"is_sponsor":0},{"start_s":297.36,"end_s":299.92,"text":"leave a comment, and don't forget to subscribe","speaker":null,"is_sponsor":0},{"start_s":299.92,"end_s":301.34,"text":"so you don't miss any of our videos.","speaker":null,"is_sponsor":0},{"start_s":301.46,"end_s":304.36,"text":"Not one of them, you should watch every single one.","speaker":null,"is_sponsor":0}],"full_text":"Thanks for watching Techquickie. Click the subscribe button, then enable notifications with the bell icon so you won't miss any future videos. All right, so you're a privacy conscious individual. You've got two factor on all your accounts. You use a reputable VPN service, and you even watched our earlier episode on what your ISP knows about you. But what if there was something lurking on your computer itself that could spill all of your secrets in spite of your precautions? I'm talking, of course, about a keystroke logger or keylogger, a nefarious type of program that does exactly what it sounds like. It logs every button you press on your keyboard. And while sometimes these can be used for legitimate purposes like parental monitoring or language research, they also make it child's play to steal passwords and search history or even spy on emails to your significant other. Yikes. And because a keystroke logger or keylogger's principle of operation is so simple, they're easy to code, easy to deploy in a wide variety of situations, and easy to hide. Once you get infected, often by clicking on a compromised link, software keyloggers can live just about anywhere, operating inside a script on the webpage itself, injecting themselves into the memory space used by your programs to make them hard to detect, or even getting into the code of your operating system itself as a root kit or by posing as a keyboard driver. By the way, root kits are nefarious little bastards. You can learn more about those up here. Making matters worse, unless you can see the keylogger in the background or in your notification tray, or you're like noticing obvious delays in the keystrokes that aren't explained by anything else, it is really difficult to know if you have one installed. Defeating them can sometimes even require specialized anti-malware software that is designed to protect against logging software. So you might want to consider that if you're really concerned that someone might be spying on you. And while you're at it, you might want to check the back of your PC too. Fortunately, these are usually pretty easy to spot, but hardware keyloggers also exist, often as a dongle that sits between your keyboard cable and the USB port on your computer. These can be especially troublesome in settings where people might not be able to see the back of the PC, like in a library or an office. And depending on how valuable your work is, even that might not be enough. There have been cases of hardware keyloggers being embedded inside a keyboard by a determined snoop, and then either retrieved wirelessly using a transmitter or physically by going back and digging it back out later. It's also even possible for keyloggers to sniff the sometimes unencrypted connection between a wireless keyboard and the PC to snatch keystrokes out of the air. And we're not done yet. Now this is some real James Bond level stuff right here. It's also possible to record the sounds that you make as you press each key, and use the fact that each key will sound slightly different based on its position to reconstruct what you typed. Then if that's not crazy enough, security researchers have found that keyboards give off different frequencies of radio waves when different keys are pressed, and can even trigger smartphone accelerometers strongly enough to discern different keystrokes if it's sitting close enough to your keyboard. So I think all of this is enough to make pretty much anyone paranoid, but I do have some good news. Unless some spy agency is after you, your best bet is to just take a quick glance at your cable every now and then if you're using a PC in a shared environment, run good anti-malware software, and as always, stay away from shady links. PIA VPN supports multiple protocols and encryption levels, which allows you to dial in the exact level of protection that you need. You can run it on up to five devices at once, and they've got apps for Windows, Mac, Android, iOS, Linux, and even a Chrome extension with support for more platforms, and they're coming soon. They've got lots of great features, so in addition to being able to bypass geo-restrictions and censorship by making you appear as though you're connecting from somewhere else, you can also block unwanted connections to prevent attacks, auto-block all traffic if the VPN disconnects, and it even includes MACE, PIA's built-in malware blocker. So what are you waiting for? Check out PIA at the link in the video description. So thanks for watching, guys. Like, dislike, check out our other channels, leave a comment, and don't forget to subscribe so you don't miss any of our videos. Not one of them, you should watch every single one."}