How does Apple discover their exploits? I'm sure they keep some around for extremely high value targets.