They make detailed models. All of this said except of course identity theft the only person that gains is the thief. An example of this is the Java Machine Virtualization. Chapter 11 restructuring.
Diffie-Halmann is the commonly used algorithm to create secret keys and it provides the way to distribute these keys between the two communicating parties. It is not only ethical but imperative that we deal with all its ethical and security loopholes through which both intentional and unintentional exploitations of the technologies can take place, and these exploitations are bound to have far-reaching consequences for humanity.
This may bring new opportunities to humanity. You'll often see when a company goes into bankruptcy but it's getting reorganized, you'll often see some people start to buy up this debt or these bonds, right here, because they want to be the new equity holders.
You might want to sell off some of the assets and all of that, but we won't go into that. They can't pay these guys.