IS KMS PICO SECURE? UNDERSTANDING THE SECURITY IMPLICATIONS OF APPLYING APPLICATION ACTIVATION TOOLS