
And then come of course the the cyber attacks, where you have very limited attribution. You can try to find out some technique patterns. You can of course try to work with some IP addresses, but that's like they will have an infrastructure that you cannot attribute to them or that will look like someone else. This is like specifically built for that. They will have preparations for that. Um and for an operator of a spacecraft, it's very difficult to detect it immediately >> [snorts] >> and to to do counter measures. The good thing is it will likely not permanently damage your spacecraft. It will just cause a denial of service of maybe some user equipment, maybe the software will
be wiped or something like that. Um but it will likely not cause any physical um damage. But for the attacker, it has a lot of benefits because it they can deny it. Um and they also have a near real-time like damage assessment. They they know what they did. Like an attacker is rarely blind in when they are performing a cyber attack.