I think we need to bear in mind that the MUD files constitute recommendations
for how a device should be treated and what policies/security should be applied
to it by a network. This draft, in itself, cannot allow a manufacturer to
actually proscribe anything. Today, the only way to achieve what
This draft raises some fascinating questions. One is "How do we ensure
that the manufacturer cannot proscribe the uses of a device that it is
capable of and that its purchaser desires?" Another is "How do we
ensure that the manufacturer cannot reduce the permitted uses of the
device after its pur