1. List of all different programs/service/host/url/port/whatever that has been captured where authentication bits have been stolen, with counts of unique credentials captured. This would allow people to know about most commonly used insecure authentication (at the con).
2. Show this information...