Methods for covertly capturing sensitive data have grown infinitely more advanced as the devices used to do so have become exponentially smaller.
Create an account to continue watching