What abuse potential is there if it only works on your own computer?, as in you have to run it yourself?
and do they actually work?as in taking a key.dat from a different computer and trying to get the key from it