Security Model

Authenticated workflows, byzantine fault tolerance, and why it works