UNDERSTANDING K2 DIABLO: SECURITY CONSIDERATIONS AND ALTERNATE OPTIONS