Revision as of 01:32, 31 January 2025 by Soma(talk | contribs)(Created page with "==Discussion Questions== * What is the basic model behind both of these systems? Hint: focus on the figures! * What aspect(s) of security are these models capturing? What are they missing?")