All these methods use the most recent security protocols to