This could be done on: * unprotected devices * brute-forced devices
This could be done on: