Comment to 'Security Violation with Timeline Module and Groups'