SwampNut
Well-Known Member
I am absolutely not an expert on that software or that scenario. I yelled the question at one of my devs and he said "probably not, but I'd have to look at the browser code." One specific thing I can comment on is "internet communications before they are encrypted" doesn't really make sense. It could just be a wording thing. The data is encrypted before it becomes "internet communications." Something would have to be IN the browser, as the data leaves already encrypted. The client in this encrypted session is the browser or app, not "the computer" itself. Does that help make any sense of it?My computer has been hacked (as in I'm running Solarwinds) and the malware has access to my internet communications before they are encrypted and after they are de-encrypted. The malware would have access to my website credentials before they are encrypted.
If someone installed a keylogger, then they'd see typed-in credentials, but not a remembered login. But in the case that someone has targeted you that deeply, having your Jeep remote started or unlocked is the least of your worries.
Sponsored