Security companies and governments conspire to discover and hide software vulnerabilities that can be used as spyware vectors