Methods for covertly capturing sensitive data have grown infinitely more advanced as the devices used to do so have become exponentially smaller.
Save my name, email, and website in this browser for the next time I comment.