capabilities on line
now exploitable
vast data volumes
erst discarded as useless
now exploitable
the methods used
to achieve exploitation
must be protected
influence standards
and specifications for
public key crypto
HTTPS,
SSL/TLS, VoIP,
VPNs too, own'd