Entitlement vs Breaches
As typically, no one wishes to share valuable information with potential abusers of that information
and as no one wishes to contribute efforts to build collaboration works that can provide more power to enemy or rival
for example, like building military strategy training systems that could be operated by enemies,
or even a simple pilot training program openly accessible to terrorists,
shared information requires entitlement and access control.
While some shared information should be freely available, much should not.