That's what keeps me up at night, because you never know where they have access to the code. As we saw in a few attacks a few years ago, some NSA tools to get access to some systems were leaked out, so there is access to electronic tools to get access to some systems, and this is what we're saying would happen in an attack on Microsoft Exchange servers. Tomorrow morning there could be another type of zero-day attack, and “zero-day” means it's newly discovered, newly exploited. Those are the intricacies of technology. It's because there is a serious lack of quality control with the type of code that's laid out on the market.
I underlined this in another intervention four years ago, saying that medical code embedded into pacemakers or insulin pumps can be accessed remotely by someone who would like to do harm to someone.