That's what I was talking about the minute when these were made public. But it's drowned out by all the noise. The attacks must be precise and specific. Having access to ALL MEMORY is not an advantage it's a disadvantage this way. Either the attacker has to send a ton of data back home, or they have to sift trough the data on the attacked computer, both should be detectable.