Comments on 'Security without firewalls'