Securing these types of 'weapons' is particularly hard Considering that the same those who establish and rely on them have the talents to exfiltrate copies without leaving traces — often through the use of the exact same 'weapons' versus the organizations that have them. There are significant price incentives for government hackers and consultant