The same sort of tools are often used for accessing IOT devices running "in the wild" by the applications managing them. Ngrok has also themselves at times marketed for this purpose (although they now call it "ngrok link", but it seems to be the same underlying tech).
It's basically using the same tactics as a RAT used by hackers, but used for legitimate uses.
It's basically using the same tactics as a RAT used by hackers, but used for legitimate uses.