The previous parts described the technical details of the touchlogging attacks. In this part, I will focus a little more on the softer parts.
First, I wanted to discuss the issue of screenshots. Grabbing screenshots is quite easy and overlaying the coordinates on the screenshot shows exactly what the user is inputing and where. However, since screenshots are quite large in comparison with X and Y coordinates, how far can you get without screenshots?