What have we learned about the spyware? | conclusion