Security Caveats and Limitations