
Just an example for to to to show a bit like because it was a pretty public case. Um so in 2014, there was a a Black Hat talk from from IOActive on uh VSAT terminals. So these are end-user terminals that are deployed everywhere around the world. Like you can get one in your backyard or you can install one on your warship and you have internet access. Um and they they just got access to a lot of these terminals and tried to find some some vulnerabilities and there was everything like uh weak passwords, hard-coded credentials, insecure protocols, undocumented protocols. You name it. Um so yeah, the the hope was that something would change. Uh unfortunately, 4 years later, they did
another talk uh going into the technical details of the weaknesses in the protocols because previously they just said, "Okay, weak protocol." And then people said like, "Yeah." We we we cannot really do something about it. Um so they followed up. Uh next report came out where they showed that they can actually geolocate some of the devices which are deployed in a military context. Um which is pretty bad.