Skip to content

Threat Model

What UCCA defends against and why. Adversarial scenarios, trust boundaries, attack surfaces.

Content pending

Document the threat model and security philosophy.