I have seen this article previously, my guess is that the components identified take the raw data from user activity before it reaches any part of the computer that can modify it. redirects it and sends it on its merry way for analysis then allowing the data to be handled normally. the added latency would be so slight that, without sophisticated timing tests, it would be all but impossible to detect in a day to day situation. So Question, what can be gleaned from such raw data? quite a lot! for example, in a track pad. the data stream recorded can be used to correlate finger movements. additionally keyboard activity can be analyzed to discern the users average typing speed. intervals between entry of blocks of data. corrective action when entering information.and so forth. the component(s) linked with the monitor will provide a bit pattern correlating with the user interface of any software being used on the system. In effect. it is the electronic equivalent of having someone standing over your shoulder watching every keystroke and hand movement and seeing things in real time as you write your biog, your article, whatever you are doing at the computer at that time. OF course I do not have the specifications of the destroyed hardware but the very nature of the components destroyed and their placement is very suggestive of the scenario I have just outlined. I do not consider myself to be an expert on computer systems by any means so anyone who sees any errors in my analysis feel free to chip in. ATB Shaun. On 05/07/2014 02:13, In Harms Way wrote: > https://www.privacyinternational.org/blog/what-does-gchq-know-about-our-devices-that-we-dont > -- *_PRIVACY IS A BASIC RIGHT - NOT A CONCESSION _*