And what prevents a malicious installation? [I know you have to get into the device first, what prevents that?]