it responds to this kind of attacks by ossia, which means control .finds it and actually rejects it and gives it, besides this, the statistics are too many, for example, i remember. he said, for example, 50 million, 60 million numbers are too much, but in our opinion, it is of little value , it is actually an initial attempt to penetrate the second level network , 56 million daily, monthly, yes, it is the second monthly, the second level is an attempt that the criminals, terrorists, means someone. who make an individual or group effort to enter a device with non-security and non-political goals? no, it may be political and security. however, its volume is a bit lower and its limits are less . it is possible that these tools are different from each other. for example, some use saib weapons which have a specific definition. we have some common viruses such as ransomware. ransomware comes to have your data in a database. it takes your data, you take possession of it , it hits its head, it encrypts it, it says you want it. if you use it , give me so much