Surveillance through altered hardware is more difficult to execute than more familiar hacks to software, but the results can be harder to remedy because the components must be detected and physically removed, or use of the hardware must be discontinued. The surveillance microchips reportedly could have connected to outside computers and secretly downloaded software to bypass security protections elsewhere, such as passwords or encryption keys, stored elsewhere on the affected servers, enabling remote computerized spying.