Presentation: Considerations of the New PI Security Model