Blog Post - How we add additional layers of security to weak apps