Trusted End
End-to-end security has become the norm, at least as far as the common requirements go. it all makes sense of course, as no one wants to be vulnerable to any unwanted / untrusted man-in-the middle. The end-to-end security concept removes that man-in-the-middle risk. But the real question then comes up - who is the other end and how can it be trusted? This is where the concept starts becoming tricky . One example I brought up a few weeks ago was HDMI, and more precisely HDCP (the copy protection scheme). Digital content providers consider the end-to-end concept as their core requirements. Up until recently online services such as Netflix, Amazon Prime and similar were not available on Raspberry Pi for example, as this platform was not considered a trusted "end". Apple TV and other "locked" media boxes were considered trusted ends. The worry was - of course - that someone would come up with a piece of code for Raspberry Pi which could grab the protected content and d...