Our approach for this project is to do a complete physical analysis on the consumer professional drones that were touching, and identification of all the available technical information that’s out there. So, if you go and pull our reports, as an example, that I’ll show you a cover image of, it has not only what we’ve found, but everything else we’ve found online about them. If somebody else has hacked them, if somebody else has done [teardowns], we want to make all of that available to you, so you can find it.
Damaged Device Forensics
Our approach for this project is to do a complete physical analysis on the consumer professional drones that were touching, and identification of all the available technical information that’s out there. So, if you go and pull our reports, as an example, that I’ll show you a cover image of, it has not only what we’ve found, but everything else we’ve found online about them. If somebody else has hacked them, if somebody else has done [teardowns], we want to make all of that available to you, so you can find it.