Perfect.
I would now want to just establish that these devices that you have cannot be used remotely. In order to use the data extraction technology, you actually need to have the device in hand. Is that right? You cannot surreptitiously take data off a device that is not in your possession and the user have no knowledge that you're doing that. Would that be correct?