. . "Such systems can mine data about users because each log-in and keystroke is analyzed in order to synthesize that data, feed it back, and share it with researchers and other users and systems." . . .