With new technologies in a more and more connected world, we have to strongly focus on the security of our private data. On the other hand, computation power is still a source which is directly connected to costs. Therefore, we often rely on third parties to outsource complex computations. This is the reason why we now want to take a closer look at transformation based approaches of privacy preserving methods to solve linear programs. We identify vulnerabilities of existing schemes and basic problems of the security analysis of transformations in context of solving linear programs.