Instructions: these are modified versus prior instructions Question. In several sentences, describe the threat model in SFI: What components are untrusted (meaning that the system tolerates incorrect or adversarial behavior by them)? What components are trusted (meaning that the overall system assumes them to be correct)? For the untrusted components, does the system defend against arbitrary misbehavior, and if not, what kinds of adversarial behavior does the system defend against?