The second thing is the cybersecurity argument. Instead of saying the current generation contains cybersecurity loopholes, we say this creates a past dependence. If you use their 3G software and hardware, it’s actual very difficult to not use them for 4G, not to use them for 5G, and so on.

Keyboard shortcuts

j previous speech k next speech