Has there been any writing on the Jade security model wrt the absence of secure element? I don't fully understand the implications of this and I'm sure somebody obsessed with security has written a tome on the topic.