64 Bits 32 Bits 16 Bits 8 Bits 4 Bits 2 Bits 1 Bit Half Bit Quarter Bit

The computer might be compromised if its physical components have been altered.For example, if a keylogger has been physically installed on the computer,your passwords, personal information, and other data typed on the keyboard couldbe stored and accessed by someone else, even if you are using Tails.