Problem 2 is mitigated by only allowing trusted sources through firewall rules.