Your approach starts to frighten me. I do not say this is too high risk, still this is the same risk any keylogger/screenlogger/webcamlogger presents. There is no logic in catching screen/webcam loggers while ignoring tcp/ip traffic loggers. Nobody knows in what way a LOT of third-party programs send data over non-crypted connections. Security MUST guarantee this traffic cannot be sniffed at least on a computer it is installed on.
Ok let me list you the differences between keyloging and passive packet sniffing and hopefully you will see:
1 - Keylogging is designed to sniff your confidential information like username and passwords whether there is a network connection or not. The information does not have to be sent through any network channel. E.g. Windows logon authentication, all sorts of CRM programs (those where people keep their confidential information) etc.
2 - With keylogging an adversary can obtain a singificant deal of information with 5 lines of code, whereas with passive sniffing, adversary has to write a lot of protocol parsing code in order to get "some" information. This
makes passive sniffing a highly specialized and targeted threat. So in laments terms, only an adversary with a quite experience in TCP/IP protocols programming can write it and only for a targeted environment i.e. a PC whcih he knows what sort of network communication is going on.
3 - Keylogging can steal information from even encrypted channels whereas passive sniffing is as risky as connecting a computer to the Internet.
These 3 basic differences are quite obvious. While the risk profile is equivalent to conecting to the internet, AND WHILE there is a WAY to DETECT and PROTECT this if wanted(Defense+ is able to block access to Windows Socket Interface if wanted), we will ofcourse focus on real threats and protecting our users from the real threats(Unless ofcourse your aim is to pass the leak tests).
Now tell me your affiliation and let me talk about your company and how proactive your company is.
Please do not try to waste my time as acting like an avreage technical person who is interested only in innocent technical discussions. You have OBVIOUS problems with COMODO as company and everyone should know why first.