... and that any programs running in secret have gotten there by leveraging a defect in the ...
... a secret. Once the most sophisticated attacker in the world finds out that secret and puts ...