1
00:00:00,000 --> 00:00:01,400
Thanks for watching Techquickie.

2
00:00:01,400 --> 00:00:02,680
Click the subscribe button,

3
00:00:02,680 --> 00:00:04,960
then enable notifications with the bell icon

4
00:00:04,960 --> 00:00:07,120
so you won't miss any future videos.

5
00:00:07,120 --> 00:00:10,020
All right, so you're a privacy conscious individual.

6
00:00:10,020 --> 00:00:12,120
You've got two factor on all your accounts.

7
00:00:12,120 --> 00:00:14,260
You use a reputable VPN service,

8
00:00:14,260 --> 00:00:16,800
and you even watched our earlier episode on

9
00:00:16,800 --> 00:00:20,200
what your ISP knows about you.

10
00:00:20,200 --> 00:00:22,020
But what if there was something lurking

11
00:00:22,020 --> 00:00:25,180
on your computer itself that could spill

12
00:00:25,180 --> 00:00:31,580
all of your secrets in spite of your precautions?

13
00:00:31,580 --> 00:00:34,480
I'm talking, of course, about a keystroke logger

14
00:00:34,480 --> 00:00:37,640
or keylogger, a nefarious type of program

15
00:00:37,640 --> 00:00:39,940
that does exactly what it sounds like.

16
00:00:39,940 --> 00:00:44,360
It logs every button you press on your keyboard.

17
00:00:44,360 --> 00:00:46,720
And while sometimes these can be used

18
00:00:46,720 --> 00:00:49,620
for legitimate purposes like parental monitoring

19
00:00:49,620 --> 00:00:53,680
or language research, they also make it child's play

20
00:00:53,680 --> 00:00:56,380
to steal passwords and search history

21
00:00:56,380 --> 00:01:00,060
or even spy on emails to your significant other.

22
00:01:00,060 --> 00:01:00,900
Yikes.

23
00:01:00,900 --> 00:01:01,560
And because a keystroke logger

24
00:01:01,560 --> 00:01:04,540
or keylogger's principle of operation is so simple,

25
00:01:04,540 --> 00:01:07,160
they're easy to code, easy to deploy

26
00:01:07,160 --> 00:01:11,780
in a wide variety of situations, and easy to hide.

27
00:01:11,780 --> 00:01:13,140
Once you get infected,

28
00:01:13,140 --> 00:01:15,440
often by clicking on a compromised link,

29
00:01:15,440 --> 00:01:18,740
software keyloggers can live just about anywhere,

30
00:01:18,740 --> 00:01:21,620
operating inside a script on the webpage itself,

31
00:01:21,620 --> 00:01:23,840
injecting themselves into the memory space

32
00:01:23,840 --> 00:01:26,560
used by your programs to make them hard to detect,

33
00:01:26,560 --> 00:01:28,820
or even getting into the code

34
00:01:28,820 --> 00:01:31,100
of your operating system itself as a root kit

35
00:01:31,100 --> 00:01:34,820
or by posing as a keyboard driver.

36
00:01:34,820 --> 00:01:37,180
By the way, root kits are nefarious little bastards.

37
00:01:37,180 --> 00:01:39,500
You can learn more about those up here.

38
00:01:39,500 --> 00:01:42,820
Making matters worse, unless you can see the keylogger

39
00:01:42,820 --> 00:01:45,900
in the background or in your notification tray,

40
00:01:45,900 --> 00:01:49,300
or you're like noticing obvious delays in the keystrokes

41
00:01:49,300 --> 00:01:51,240
that aren't explained by anything else,

42
00:01:51,240 --> 00:01:54,660
it is really difficult to know if you have one installed.

43
00:01:54,660 --> 00:01:56,980
Defeating them can sometimes even require

44
00:01:56,980 --> 00:02:01,180
specialized anti-malware software that is designed to protect

45
00:02:01,200 --> 00:02:03,120
against logging software.

46
00:02:03,120 --> 00:02:05,580
So you might want to consider that if you're really concerned

47
00:02:05,580 --> 00:02:07,520
that someone might be spying on you.

48
00:02:07,520 --> 00:02:09,620
And while you're at it,

49
00:02:09,620 --> 00:02:12,080
you might want to check the back of your PC too.

50
00:02:12,080 --> 00:02:15,140
Fortunately, these are usually pretty easy to spot,

51
00:02:15,140 --> 00:02:18,440
but hardware keyloggers also exist,

52
00:02:18,440 --> 00:02:22,200
often as a dongle that sits between your keyboard cable

53
00:02:22,200 --> 00:02:24,520
and the USB port on your computer.

54
00:02:24,520 --> 00:02:27,020
These can be especially troublesome in settings

55
00:02:27,020 --> 00:02:30,920
where people might not be able to see the back of the PC,

56
00:02:31,200 --> 00:02:34,160
like in a library or an office.

57
00:02:34,160 --> 00:02:37,060
And depending on how valuable your work is,

58
00:02:37,060 --> 00:02:39,720
even that might not be enough.

59
00:02:39,720 --> 00:02:42,820
There have been cases of hardware keyloggers

60
00:02:42,820 --> 00:02:47,140
being embedded inside a keyboard by a determined snoop,

61
00:02:47,140 --> 00:02:50,800
and then either retrieved wirelessly using a transmitter

62
00:02:50,800 --> 00:02:54,640
or physically by going back and digging it back out later.

63
00:02:54,640 --> 00:02:58,240
It's also even possible for keyloggers to sniff

64
00:02:58,240 --> 00:03:01,200
the sometimes unencrypted connection

65
00:03:01,200 --> 00:03:04,400
between a wireless keyboard and the PC

66
00:03:04,400 --> 00:03:07,840
to snatch keystrokes out of the air.

67
00:03:07,840 --> 00:03:09,960
And we're not done yet.

68
00:03:09,960 --> 00:03:12,840
Now this is some real James Bond level stuff right here.

69
00:03:12,840 --> 00:03:17,320
It's also possible to record the sounds that you make

70
00:03:17,320 --> 00:03:18,940
as you press each key,

71
00:03:18,940 --> 00:03:22,760
and use the fact that each key will sound slightly different

72
00:03:22,760 --> 00:03:27,660
based on its position to reconstruct what you typed.

73
00:03:27,660 --> 00:03:29,420
Then if that's not crazy enough,

74
00:03:29,420 --> 00:03:31,420
security researchers have found

75
00:03:31,420 --> 00:03:33,860
that keyboards give off different frequencies

76
00:03:33,860 --> 00:03:36,980
of radio waves when different keys are pressed,

77
00:03:36,980 --> 00:03:40,740
and can even trigger smartphone accelerometers

78
00:03:40,740 --> 00:03:43,940
strongly enough to discern different keystrokes

79
00:03:43,940 --> 00:03:46,560
if it's sitting close enough to your keyboard.

80
00:03:48,250 --> 00:03:49,710
So I think all of this is enough

81
00:03:49,710 --> 00:03:51,530
to make pretty much anyone paranoid,

82
00:03:51,530 --> 00:03:53,670
but I do have some good news.

83
00:03:53,670 --> 00:03:56,550
Unless some spy agency is after you,

84
00:03:56,550 --> 00:03:58,990
your best bet is to just take a quick glance

85
00:03:58,990 --> 00:04:00,750
at your cable every now and then

86
00:04:00,750 --> 00:04:02,970
if you're using a PC in a shared environment,

87
00:04:02,970 --> 00:04:05,010
run good anti-malware software,

88
00:04:05,010 --> 00:04:10,010
and as always, stay away from shady links.

89
00:04:12,240 --> 00:04:16,500
PIA VPN supports multiple protocols and encryption levels,

90
00:04:16,500 --> 00:04:19,560
which allows you to dial in the exact level of protection

91
00:04:19,560 --> 00:04:20,460
that you need.

92
00:04:20,460 --> 00:04:23,420
You can run it on up to five devices at once,

93
00:04:23,420 --> 00:04:27,900
and they've got apps for Windows, Mac, Android, iOS, Linux,

94
00:04:27,900 --> 00:04:31,460
and even a Chrome extension with support for more platforms,

95
00:04:31,460 --> 00:04:32,420
and they're coming soon.

96
00:04:32,420 --> 00:04:34,020
They've got lots of great features,

97
00:04:34,020 --> 00:04:37,080
so in addition to being able to bypass geo-restrictions

98
00:04:37,080 --> 00:04:38,720
and censorship by making you appear

99
00:04:38,720 --> 00:04:40,520
as though you're connecting from somewhere else,

100
00:04:40,520 --> 00:04:43,540
you can also block unwanted connections to prevent attacks,

101
00:04:43,540 --> 00:04:46,300
auto-block all traffic if the VPN disconnects,

102
00:04:46,300 --> 00:04:50,500
and it even includes MACE, PIA's built-in malware blocker.

103
00:04:50,500 --> 00:04:51,640
So what are you waiting for?

104
00:04:51,640 --> 00:04:55,140
Check out PIA at the link in the video description.

105
00:04:55,140 --> 00:04:55,980
So thanks for watching, guys.

106
00:04:55,980 --> 00:04:57,360
Like, dislike, check out our other channels,

107
00:04:57,360 --> 00:04:59,920
leave a comment, and don't forget to subscribe

108
00:04:59,920 --> 00:05:01,340
so you don't miss any of our videos.

109
00:05:01,460 --> 00:05:04,360
Not one of them, you should watch every single one.
