"Such controls rarely work as expected, and more to the point it does not prevent any of the five major attack vectors presented in this paper." . . . .