Configuring for capacity vs configuring to prevent a Deep State hack?
The former is very easy and hardly worth mentioning, while the latter is much harder to do.
The very fact you and others are watching it right now proves it was not what you are calling “Deep State”. Just trust me on that.