Comment the way it should be for TOFC type stuff (Score 1) 156
mock up a few copies and then dare folks to hack it (sort by remote and physical access type hacks)
when you get something that can stand up to a decent number of hacks (remote hacks that require you to be on the same subnet on a blue moon with Big$ tool between the hours of 22:00 and 23:59 and the product needs to be in mode X and physical hacks that would be obvious don't count) then you as a last check put up a BIG$ bounty on hacks.
Then you can release a cyber product targeting children.