22 trans movement leaders, artists, and organizers come together for a photo shoot.

They record usernames and passwords for banks, emails, and social media.

While there are some legitimate use cases, seeing this phrase as a generic download link on an untrusted website is a major red flag for . What These Tools Actually Do

Keyloggers operate silently in the background to capture sensitive information before it is ever encrypted by a website or app.

These downloads are often Trojans that appear to be one thing (like a game or utility) but secretly install the logger alongside it.

These tools auto-fill credentials , meaning you don't actually type the password for a logger to record.

Download Keystrokes Here May 2026

They record usernames and passwords for banks, emails, and social media.

While there are some legitimate use cases, seeing this phrase as a generic download link on an untrusted website is a major red flag for . What These Tools Actually Do

Keyloggers operate silently in the background to capture sensitive information before it is ever encrypted by a website or app.

These downloads are often Trojans that appear to be one thing (like a game or utility) but secretly install the logger alongside it.

These tools auto-fill credentials , meaning you don't actually type the password for a logger to record.

Return to Title Slide

The Fruits We Bear: Portraits of Trans Liberation

gallery image 1
gallery image 2
gallery image 3
gallery image 4
gallery image 5
gallery image 6
gallery image 7
gallery image 8
gallery image 9
gallery image 10
gallery image 11
gallery image 12
gallery image 13
gallery image 14
gallery image 15
gallery image 16
gallery image 17
gallery image 18
gallery image 19

Newsletter