Perhaps it is no longer appropriate for me to discuss computer vulnerabilities