Watch this video on YouTube
Which of the following statements is true regarding potential exploits associated with pervasive computing?