(Source: Foreign Affairs) First, there are the writers of the malicious software, which blocks victims’ … and published the National Security Agency attack tools that included the exploit …