The three initial pillars of analysis (threat and security analysis), architecture specifications for firmware and hardware and an open source implementation, are now joined by a fourth element ...