I don't know how you could use this to collect info from someone's computer. This is not malware. I'm sorry if this sounds harsh, but if you want to use it in this way shame on you. I designed this to demonstrate that it can be done. One could use this to protect a cell phone from spying, for one thing. This algorithm was certainly not meant to cause such an uproar.