What can be addressed when using retrospective security techniques?