Securing these kinds of 'weapons' is especially complicated Because the very same individuals that establish and utilize them have the abilities to exfiltrate copies without leaving traces — at times by using the exact same 'weapons' from the organizations that include them. There are sizeable price incentives for presidency hackers and consultan