What if you snuck in a quantum comms backdoor into every smartphone and broadband modem — on the pretext of surveillance — and then used it as the primary network access to destroy the information control of the enemy?
That would be a trojan horse with a grin.
Tee hee hee... Love it..