A cyber team is explaining to board members the concepts of sideloading and jailbreaking as they pertain to mobile device security. The team aims to clarify the practices and their implications. When discussing sideloading, what should the team emphasize as the two primary characteristics of this practice?
a) Installing apps from unofficial sources and potential security risks
b) Customizing the device interface and improving performance
c) Bypassing carrier restrictions and unlocking the device
d) Enhancing user privacy and securing data encryption