Need to structure the report properly: introduction, history of KuttyWap, legal implications, security risks, alternatives, and conclusion.