An analysis of containment, surveillance, and authentication for software: Searching Inside