<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<div dir="ltr">
<div id="gmail-m_703320877085808208divtagdefaultwrapper" style="color:rgb(0,0,0);font-family:calibri,arial,helvetica,sans-serif;font-size:12pt" dir="ltr">What I am really wondering here is how the full exact query was captured and then repeated by a 3rd party out in the wild. The implications are kind of scary.<br></div></div></blockquote><div><br></div><div>scary = prefer not to think about. an understandable, and ubiquitous preference. which leaves leagues of leeway for such activity to accrete.<br></div><div><br><div class="gmail_extra"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div style="overflow-wrap: break-word;">Then
I would suspect there’s a packet sniffer out there on an infected
computer (not necessarily yours) that is getting this information via
WiFi… Of course, that means your laptop is on WiFi phoning home.<br></div></blockquote><div><br></div><div>could be anywhere, eg modem, or at the provider<br></div></div></div></div></div></div></div>