@lxo @glynmoody I’d like to point out that there are two things being discussed - the machines themselves and the system built around them, which includes processes and controls. I haven’t heard of a viable attack yet that wouldn’t require compromising multiple components of the system. The machines and processes can always be improved, but we should acknowledge when good enough is good enough and, also, without proper threat assessment, security becomes meaningless.