L
Standardized by OASIS (not IETF)
Limited in communication patterns
Its wide adoption is due to its ease of use
Intrinsically insecure and vulnerable
Protocol is flawed
Many vulnerabilities cannot be amended
Intrinsically un-interoperable
Several governments warn against its use on the Internet
Serves a purpose in closed networks (M2M)