“It is like a bank telling the public they have the most secure vault in the world, and then taping the combination on the wall next to the vault door. Even worse, key logging features that would record system activity showing such control can also be manipulated or disabled, thereby rendering any penetration of this system nearly undetectable.”
– Page 13 of Filing