From b733b5ce212ce5a1c8501df556e8c4133d8880ca Mon Sep 17 00:00:00 2001
From: Michael McCool Terminology
constraints on options or subprotocol mechanisms.
Examples are HTTP, CoAP, or MQTT.
+ Common Deployment Patterns
that are defined in later sections of this specification.
- This section also makes use of the concept of a Trusted Environment,
+ This section also makes use of the concept of a Trusted Environment,
which is a set of devices that allow relatively unrestricted
access to one another. This is a common approach but carries some
risks, which are discussed in section
From 7543cf909ab58a3a51103bd30080a74c56fee80e Mon Sep 17 00:00:00 2001
From: Michael McCool Trusted Environment Risks
In section
several usage scenarios are presented
- that include the concept of a trusted environment and a security
- boundary. Entities that are members of a trusted environment
+ that include the concept of a Trusted Environment and a security
+ boundary. Entities that are members of a Trusted Environment
all share access to a common set of resources (such as a local
network) and are implictly granted certain access rights to
each other. A common example would be a WiFi LAN in the home
@@ -4285,7 +4285,7 @@ Trusted Environment Risks
with each other without any further access controls.
Allowing implicit access rights like this and using a single
shared secret for a large number of entities means that a single
- malicious actor with access to the trusted environment can
+ malicious actor with access to the Trusted Environment can
cause significant damage.
From a27f9aac0a3e82e71eb1ef9cdf0304658b3b2de8 Mon Sep 17 00:00:00 2001
From: Michael McCool Terminology