Show how someone who is on the no-fly list can manage to fly provided that boarding passes could be generated online (as an HTML page) and then printed. Please provide a step-by-step description of the attack.
Which additional security measures should be implemented in order to eliminate this vulnerability?