All: Does anyone know what the action items are in response to the OTR security analysis (http://www.stanford.edu/~amo/otr_analysis.pdf)? Can these issues be addressed? Is there a roadmap for this? I'm not at all being critical, just very eager to enjoy the use of the nicest security system I've yet seen. Anxiously awaiting, -- Rich Griffin