IS KMS PICO HARMLESS? UNDERSTANDING THE SECURITY IMPLICATIONS OF USING SOFTWARE ACTIVATION TOOLS