Title

Goals

Overview

Good Practice

Techniques

Dependencies [optional for Robustness only proposals]

Examples (informational)

Use-cases [optional for Robustness only proposals]

Attack resistance and limitations

Usability effect [optional for Robustness only proposals]

Expected User behavior

Disruption

Background (informational)

References