Let's face it, these plastic lovelies aren't exactly built with firewalls in mind. A savvy operator can easily bypass their systems. We're talking about hacking hidden functions, maybe even Milicious modifying your own scripts. Think of the possibilities: a singing doll, one that can remember your every move. The only limit is your coding prowess. … Read More