. . . . "The decryption process could be tied to a specific device, a server, or peripherals such as printers and routers." . . .