This is the cybersecurity equivalent of chumming in waters infested with great white sharks and then jumping in that water ...