Cybersecurity Privacy IPC trilogy considering encryption-based, non-extractive cyber attacks By Jaime Cardy