quote:
Originally posted by MenthiX
you are describing a keylogger/trojan now
No I am not, please read the post more carefully. It's not a keylogger because no keys are being logged, it works differently. And a trojan similarly with a possible method of deployment, however it does not gain any control. If the other contact voluntarily put that theoretical plugin on it would be legal...