@@ -78,15 +78,15 @@ to mitigate such attacks.
7878
7979.. sidebar :: Picking Your Battles
8080
81- *In Chapter 1 we talked about trust and threats being two sides of the
82- same coin, but another way to frame the discussion is that every secure
83- system design starts with two lists: (1) those elements you trust,
84- and so can build upon; and (2) those elements you do not trust, and
85- so must treat as a threat that you defend against. But this is no
86- different than for any system you build: you first identify the
87- building blocks you plan to take as a given, and then you design a
88- solution that fills the "gap" between those building blocks and the
89- requirements you are trying to meet. *
81+ *In Chapter 1 we talked about trust and threats being two sides of
82+ the same coin, but another way to frame the discussion is that
83+ every secure system design starts with two lists: (1) those elements
84+ you trust, and so can build upon; and (2) those elements you do not
85+ trust, and so must treat as a source of threats that you defend
86+ against. But this is no different than for any system you build:
87+ you first identify the building blocks you plan to take as a given,
88+ and then you design a solution that fills the "gap" between those
89+ building blocks and the requirements you are trying to meet. *
9090
9191 *One way in which security is unique is that over time you may
9292 discover that you need to move items from the first list to the
0 commit comments