And this extends also to pretty much every critical infrastructure that the adversary already knows the position of, including the telecom core networks. We can probably expect that they will all be destroyed by those things in the first few minutes. And then, which is why we also need to virtualize that and implement like roaming, disaster roaming and so on.

Keyboard shortcuts

j previous speech k next speech