-data while key management and other security issues are left out, leaving
-the implementation vulnerable to various security problems.
+data while key management and other security issues may be left out, leaving
+the implementation vulnerable to various security problems. The other
+problem is also that the external protocols tend to leave the network
+only party secured; usually only two points in the network are secured with
+for example SSL. While SSL does provide provable security it is not
+enough to provide security for a network as a whole.