So, in addition to the privacy-preserving arm, which we’ve talked about in this conversation, there’s also this provenance arm; such technologies can be adopted by the people. And if we make the provenance arm strong enough, we can be resilient even when the main connections start to break down.