awk, I think the spyware example is a very good one. But as usual there are some counter-examples of the same kind. For instance, AMD's Geoff Strongin recently mentioned that some cookies actually improve function. So how do you distinguish a good cookie from a bad piece of spyware?
I'm not sure how those questions get answered, but they do need to be answered in order to get the infrastructure right. Is that the kind of discussion that goes on in places like ISTPA do you suppose?