Trust Boundaries vs. Attack Surfaces