What happens when a high school student discovers and tries to disclose security vulnerabilities in two technology products used by his school?