This concept is rooted in uplink security, where a device (or a device manipulated by an attacker) sends a message to the ...