There are two kinds of systems: the ones that have security holes and the ones that people don't use.