The phone phreaker was able to manipulate the telephone system to make free long-distance calls.
The computer phreaker hacked into the company's database to access sensitive information.
The hacker phreaker used their skills to break into government servers.
The digital phreaker found a way to bypass the security measures of the online banking system.