Because you can't steal IP in production. You only have access to finished modules/parts with encrypted software that cannot be copied.
Because you can't steal IP in production. You only have access to finished modules/parts with encrypted software that cannot be copied.