Black 1 - Conversion of individual pc and surrounding system to prevent illegal hacks.
Black 2 - Conversion of individual item and system to prevent pleoramatic hacks.
Black 3 - Monolith conversion of item.
White 6 - Black 1/2/3 conversions with skim threats removed.
Black 4 - Cold - width laboratory removal of fragmentation division loss through hacks.
Black 5 - Public/ private privacy exposure and removal of loss through visual hack.
Black 6 - Public/ private privacy exposure and removal of loss through audio hack.
White 15 - Codeword policy and removal of visual dimension threats with audio hacks reduced.
White 21 - White 6 incorporated. With all inclusive limitations on theft of intellectual arc web property.