I'm pretty sure good guys and bad guys are used the way friendly and enemy are used by militaries (e.g. friendly fire or front toward enemy).
The only difference, by my understanding, is that white moves first.
Pulling from Cold War history any technology that is able to be used by white but not by black will be captured and re-engineered to make a version only usable by black, and both sides will strive to defeat or even override the enemy's friendly-only tech.
It still amazes me this -- I want to say Machiavellian notion but don't want to besmirch Machiavelli -- that subversive methods of governance are somehow a lesser crimes than exposure of subversive methods of governance to the public.
What this reveals about those who make such arguments is that they are far more interested in their immediate overlords and their objectives, rather than the good of the nation as a whole. Better to be the one who fellates the devil in Hell than yet another commoner in Heaven.
Act of Aggression related to Act of War: Direct Action in 2005 is following the RTS format of the Westwood titles, similar to Command and Conquer: Generals. This isn't the first time I've seen smaller developers, even indies making spiritual successors to games where their franchise holding AAA publishers failed. It's a trend I hope will continue.
I've been thrilled with Starpoint Gemini, a clear spiritual successor to Freelancer.
School-issued laptops are commonly issued with spyware on them
This spyware not merely used to observe what kids are looking at online, or to determine their whereabouts when they're supposed to be in school, but also to observe them undressing when in their own rooms.
We get the occasional news article about a custodian getting fired for doing this, but like NSA techs looking at private cheesecake emailed between adult lovers, getting to ogle underage kids in their own rooms is an unmentioned perk for the administrators authorized to check on the laptops.
Don't think they don't. Don't even think that they're kind enough to at least not pass around video captures to their colleagues when something extra juicy is discovered.
When we insert vulnerabilities, they will be abused by those who have access to them. There are no good guys.