Whitepaper: More Security, from Bottom to Top