The second thing is that it’s not also not about backdoors or Trojan horses. It’s about a path dependency. Once we use a PRC component in the 3G deployment, it becomes very difficult to move away to another design, to another system.

Keyboard shortcuts

j previous speech k next speech