I reviewed this document on the behalf of the operations and management directorate. While this document is adequately evocative of the risks associated with essentially unsecured information being ingested via QR codes it's fairly unsatisfying with respect to mitigitations offered. this is a much a property of operating in the real world as it is a question of protocol implementation. While this is described as social engineering, it's a more deeply engineered falsehood that extends outside the realm of human decision-making. If I were to nitpick the described security issues it is that operation of or decision making over a device on the basis of qr code embedded in a sticker can never provide a degree of certainty that the device is what it says it is that powering the device up and interrogating it's mud profile can achieve, that without some transitive trust property that can be extended to the device on the basis of the security of it's internals (e.g. protected cryptoghric secrets that the manufacturer or owner have embedded) that the information embedded in the online formation cannot be trusted to map to that device. so for example if as part of lifecycle management one decides how to dispose of something broken or unpowered based on a mud profile sticker that information is not trustworthy on the basis of anything other than common sense or external validation. e.g. is this transformer full of dioxin or in fact mineral oil as the documentation behind the sticker claims.