https://9dok.net/document/zlgxp1m2-un-trusted-hb-security-vulnerabilities-of-trusted-hb.html