On Mon, Dec 30, 2013 at 7:21 AM, coderman <coderman@gmail.com> wrote:
... the keyboard tampering:
tamper evidence combined with secondary reference copies to compare (buy two in cash on demand rather than shipped, use second as fallback (vastly more frequent scenario) or as reference with sketch kit (what did you did? ;) this leads to the question i intended but omitted in prev: to date most FBI/NSA/IC keyloggers have been visually obtuse dongle type, varied software type, particularly for Windows, Mac, and Dos at this point in the past. the top class (effectively undetectable?) hardware keyloggers appear to have avoided detailed disclosure. is anyone aware of leaked hardware keylogger specs or ops in the veign of magic lantern / CIPAV / Carnivore / DCS* category applied to covert hardware based compromises?