That’s the first one is the control argument. The second one is the path dependency argument. Exactly as you’ve said, even if we do a thorough penetration testing and this line security perimeters, that is only good for that particular version of the firmware.