New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing. ↗
No way, no how did I break into NORAD. That's a complete myth. And I never attempted to access anything considered to be classified government systems. ↗
Of course there are many ways we can reuse something. We can dye it. We can cut it. We can change the buttons. Those are other ways to make it alive. But this is a new step to use anything - hats, socks, shirts. It's the first step in the process. ↗
To be honest, I think we should find first the possibility to make it. Research is first - if you're not interested, you never can find something. Many things happen from forgotten machines - ones that are no longer used. ↗
You see it in the many bouncing clothes that are not just pleats. To make them, two or three people twist them - twist, twist, twist the pleats, sometimes three or four persons twist together and put it all in the machine to cook it. ↗