Threats
Cyber spyingDangerous searchTelemetryData leakagePrivacy violation and trackingMass surveillance systemsPhysical access and computer forensicsPeeping information on the screenMass hacking of devicesLoss of digital dataCyber-warfare, cyber diversions and cyber terrorismPlanting digital evidenceDeanonymization and unicalizationDigital identity theft