Methods for covertly capturing sensitive data have grown infinitely more advanced as the devices used to do so have become exponentially smaller.