We make sure that there is, at any given time, if any one major provider goes down, either the identity provider, computation provider, storage provider, with a push of a key, we can switch to somewhere else. That is more than just countering the intentional attack. It also protects against like the accidentally somewhere it catches fire as we have seen in the KakaoTalk case in Korea.