Remix.run Logo
gobdovan 7 hours ago

Now two popular articles argue about if cybersecurity can be seen as proof of work.

Interestingly enough, I was thinking of writing an article about how cybersecurity (both access models and operational assumptions) can be modeled as a proof (NOT proof of work) system. By that I mean there is an abstract model with a set of assumptions (policies, identities, invariants, configurations and implementation constraints) from which authorization decisions are derived.

A model is secure if no unauthorized action is derivable.

A system is correct if its implementation conforms to the model's assumptions.

A security model can be analyzed operationally by how likely its assumptions are to hold in practice.