Wall security — architecture, threat model, what we don't store | Wall