| http://www.w3.org/ns/prov#value | - It typically involves a software agent which is difficult to detect or remove.[1] However, there are malicious types of phoning home such as surreptitious communication between applications or hardware installed at end-user sites and their manufacturers or developers.
|