it is advisable not to rely solely on them for sensitive security applications without additional security measures. “`