point 5 is the footnote to the line specifically about MITM attack, but yes, can be clarified (all these points are footnotes to specific cells in the comparison table).
We probably should modify p2p column from "vulnerable to MITM" to "sometimes vulnerable", as including key material in the address is rather common (although not universal).