Bypassing the Security Unit

Security always implies a tradeoff: you sacrifice user convenience in exchange for security. In a computer system, we see this when a VPN is setting up a secure connection, because it often takes minutes to exchange and validate all the credentials passed back and forth in order to establish a secure key. We also