9. Security Considerations9. Security Considerations 9.1. DNS spoofing attacks9.2. Cross-directory attacks9.3. Implementation risks9.4. Persistence risks