• It’s also another potential attack vector for hackers to use. Imagine hackers getting control of the system (or simply finding whatever standardized backdoor the companies have been forced to include) and being able to shut down an entire city over a weekend.