5. As the technology becomes ever more penetrating and intrusive, information leakage has become _____.(A) remnant (B) rampant (C) resonant (D) reminiscent