In this chapter, we present solutions for some attack vectors which have been talked of.