During this portion, we go in the security, stability, and privacy fears associated with using drones. We particularly evaluate these devices’ weaknesses to possible attacks that may produce a malicious attack or drone crash, and we evaluate the security demands of such devices. Disk-Arbitrator - is usually a Mac OS https://www.gmdsoft.com/