With this principle, it is left to the user to reduce the security and privacy of an application, and not left to Microsoft / the manufacturer of the software.Malicious users commonly scan networks for applications or devices that are known to be insecure by default, such as wireless routers and web servers.