It quickly dispels any doubt that digital information any less valuable than cold, hard, cash.

Also, threat models vary greatly depending...