Let's face it, these plastic lovelies aren't exactly built with firewalls in mind. A savvy operator can easily bypass their programming. We're talking about unlocking hidden functions, maybe even modifying your own programs. Think of the possibilities: a singing doll, one that can predict your every move. The only limit is your coding prowess. But … Read More