The mitigations to the content exfiltration case regard participants
in the protocol as potential passive attackers themselves, and apply
the mitigations discussed above with regard to passive attack.
I'm not sure what it is trying to say. It doesn't seem to be supported by the preceding text.
I don't actually know what to do about this:
I'm not sure what it is trying to say. It doesn't seem to be supported by the preceding text.