5G’s dynamic software-based systems have far more traffic routing points than the current hardware-based, centralized hub-and-spoke designs that 4G has. Multiple unregulated entry points to the network can allow hackers access to location tracking and even cellular reception for logged-in users .