$ ./authenticate --user=visitor --clearance=L1
▸ Verifying digital signature ......... OK
▸ Running threat intelligence scan .... CLEAN
▸ Establishing encrypted tunnel ........ ACTIVE
▸ Loading portfolio modules ........... DONE
✔ ACCESS GRANTED — Launching portfolio _