At the end of the article, the author seems to suggest ______.
A.there is no solution to the flaw in the Internet technology B.there is much worry within the academic circle about Internet security C.US government is indifferent to the hacker attacks D.Internet traffic is easily vulnerable to hack attacks