As Ed Felten recently wrote in IEEE Security & Privacy May/June 2003, 60, 61: "In fact, the direct effects of TC are relatively harmless. It is the indirect effects that are worrisome - not what TC does, but what others will build on top of it." All the more, it is important for TC developers to publish detailed usage scenarios and documentation about how all the different players in a TC ecology will interoperate with each other. Currrently, there are just not enough facts available out there to engage in a detailed discussion about these issues.