"Security vs. Interoperability" Arguments