Should exploits be a concern of computer science theory? Can they tell us about fundamental properties of computing rather ...