The security model relies on cryptographic proofs and consensus-aligned validation
https://atavi.com/share/xnvuq6z18kasc
The security model relies on cryptographic proofs and consensus-aligned validation, minimizing risks from replay or double-spend attacks.