http://www.nruns.com/_downloads/advisory28122011.pdf
Should we add some randomization to prevent abuse? It's hard to anticipate how folks might leverage apr, and how malicious folks might then seek to exploit computational workload vectors. Thoughts?