We can only wonder how long intelligence agencies have been exploiting these vulnerabilities.