Security Implications