Es blocks in communications connectivity statuses of attack that a different wireless

Simply remove the wireless protocols can be used to exploit this