IS KMS PICO PROTECTED? UNDERSTANDING THE SECURITY IMPLICATIONS OF EMPLOYING SOFTWARE ACTIVATION EQUIPMENT