The second thing is the cybersecurity argument. Instead of saying the current generation contains cybersecurity loopholes, we say this creates a past dependence. If you use their 3G software and hardware, it’s actual very difficult to not use them for 4G, not to use them for 5G, and so on.