security.md
π 0.0%
Dimensions
cyber/security
nox security security properties and formal guarantees of nox security bounds attack surface formal properties Turing completeness Theorem: nox is Turing-complete. Proof: Construct encoding of arbitrary Turing machine M via patterns 0-4, 9. ∎ confluence Theorem: nox is confluent. Proof: Orthogonal…
cybernode/infrastructure/security
Security Back to bostrom infrastructure Blockchain Security Consensus Bostrom uses CometBFT (Tendermint) consensus Byzantine fault tolerant up to 1/3 malicious validators GPU-based proof-of-work component for ranking Validators 100 active validators secure the network Delegated Proof-of-Stake…
zheng/docs/explanation/security
security properties the security of zheng reduces to a single assumption: the collision resistance of hemera. every proof, every verification, every recursive composition — all of it rests on the hardness of finding two distinct inputs that produce the same hemera digest. if hemera is secure, zheng…
hemera/docs/explanation/security
ecosystem context Poseidon2 deployment landscape | System | Field | t | R_F | R_P | Capacity | Status | |---|---|---|---|---|---|---| | Plonky3 | Goldilocks | 12 | 8 | 22 | 4 (128-bit) | Production | | SP1 | BabyBear | 16 | 8 | 13 | 8 (124-bit) | Production | | RISC Zero | BabyBear | 16 | 8 | 13 |…