Part three of a series on service-to-service user-data portability architectures and how we can do threat modeling against the generic architecture. While exploring access control, harmful content and spoofing, many details turn out to be use-case dependent and the threat model must be considered again when we implement specific solutions. Hopefully this is a useful map of the threat territory.