From 87757af8d32b0e98b685fb09fa1246a9871fd6c6 Mon Sep 17 00:00:00 2001
From: Mike Jones
elsewhere in the spec. DIDs are designed to operate under the general
Internet threat model used by many IETF standards. We assume uncompromised
endpoints, but anticipate that messages could be read or corrupted on the
-network. Protecting against an attack when a system is compromised requires
-external key-signing hardware (see Section ).
+network.