HIBT security protocols review

HIBT security protocols review