IS KMS PICO PROTECTED? UNDERSTANDING THE SECURITY IMPLICATIONS OF APPLYING APPLICATION ACTIVATION TOOLS