Implementation and implications of a stealth hard-drive backdoor