Securing this kind of 'weapons' is especially tricky since the very same folks who create and make use of them have the skills to exfiltrate copies devoid of leaving traces — at times by using the very same 'weapons' in opposition to the businesses that have them. There are actually significant price incentives for presidency hackers and consulta