Well, I guess that depends on your requirements and definition for security
Paul Lucas