Q. How is China protecting their own critical information infrastructure?