22.matrix based security part 2