Scientific American printed an article (May 2009–see website here) about how cybercriminals and other clever folk can get
around today’s sophisticated firewalls and encryption. In short:
- decode the unique sound of each keyboard key
- capture reflections of the screen from a reflective surface behind the monitor (i.e., eye glasses, even eyeballs)
- take a movie of the typing hands and find out what keys are typed
- capture the data as it goes to the printer (who would think to encrypt that)
- tap into the webcam
Scary, but true.