Considerations: Does the application identify or recognise potential incentives to an adversary? Does the proposed work increase or decrease known attack surfaces? Does it create new surfaces? Does the proposal consider potential illicit uses? Does it discuss how an adversary might use the solution to further their own goals? Does the application identify potential unintended consequences? Does the application identify and understand the proposed work's asymmetry? Given an attacker and defender of the effort, does the application explain which role is more advantageous (effort, cost, time, etc.) and why? Does the application explain medium and long‐term strategies from both the attacker and defender point of view? Does the application discuss how one could defeat the effort and identify its deficiencies, or does it presume there are none?