This could be good, but do you have a list of rules in terms of how the supposed computer systems would work, and possibilities in how they can be exploited?