Threat Model Document

Type: Reference document

Priority: 🟡 Write Next (60–90 days)


Purpose

Identify and design against the failure modes that would corrupt the mission.

Outline

1. Capture

One entity quietly becomes the center.

Defenses:

2. Centralization

Convenience causes everyone to rely on one place.

Defenses:

3. Wallet Hell

Incompatible wallets and tools.

Defenses:

4. Foundation Dominance

The non-profit becomes “the voice of truth.”

Defenses:


TODO: Write content