Q3: What is a major entry point for device hijackers to infiltrate?