@leedohm wrote:
This describes the functionality of a keylogger. While there are valid uses for such techniques, the far more common uses are nefarious (collecting passwords, stealing access to private information, etc). We don’t want Electron used to violate others’ privacy or worse, so to err on the side of caution any topic requesting assistance with this will be summarily closed.
Posts: 1
Participants: 1