Skip to content

Main

I attempt to simplify and shorten the text, and refine the threat analysis by:

  • clarifying the separation between the provider of a communication service and the application software and its maker. This allows this analysis to be applicable to cases where the provider of a proprietary service is the maker of its app client, and cases where third-party apps for such a service exist, as well as the case of an open network and open independently-made clients (in which case the questions about the provider are voided)
  • expanding the prose on servers, if any, and on trusting them.

Merge request reports

Loading