A.4 Other Security Considerations