Let's face it, these plastic lovelies aren't exactly built with firewalls in mind. A savvy operator can easily penetrate their systems. We're talking about hacking hidden functions, maybe even modifying your own programs. Think of the possibilities: a talking doll, one that can predict your every move. The only limit is your coding prowess. But rem