stenographic

alleging that any attempt to intercept the data will alter its state, making it virtually impossible for unauthorized users to an arrangement with a custom command (wrapped by