Assume every terminal is key logged. Create a hack that logs a reverse engineer.