We must never forget that when dealing in Cyber-security and Information-security, the utmost basic rule is specific aligns with secure, like an invented analogy. We begin by only having specific channels of entry/incoming and exit/outgoing rules for signals or information. If we must be unspecific, then we must have specified rules, or we are automatically insecure, even if secure by all other means or through other means such as system firewall. The program may be immune to attacks or theft or intrusion, etc. or else, but remains insecure unless is specific by all means and in all ways.