http://www.wired.com/2011/10/iphone-keylogger-spying/ etc.
Luckily, not my kind of a gig.
>http://www.wired.com/2011/10/iphone-keylogger-spying/ etc.
This attack depends on being able to identify individual keys so it's not really applicable here. However, a similar attack might be possible here if not for the very small sample size.
http://www.wired.com/2011/10/iphone-keylogger-spying/ etc.