"This attack is not likely to be used except by people working on a project at the level of a Stuxnet, and even then, only in extremely rare cases." . . . .