by strstr (539330) writes: plus they have automated surveillance systems that:1. track all IP connections for them, so they know who connects and to where.2. all IP, SMTP, and HTTP, FTP and other protocols that are not encrypted are being watched, so they know what is accessed and what information is sent to the server (GET/PUT/PUSH) requests.3.