Security model and cryptographic foundations
Understanding the security assumptions and threats
Cryptographic primitives used in ComputeNet
How the protocol undergoes security review
Security vulnerability disclosure program
Procedures for handling security incidents