Bridge security through the lens of trust-minimization