Cybersecurity models of the past no longer work well, and the best practices of software design and running of complex systems are used more today by cybercriminals than by industry. We believe that teams and individuals should be allowed to specialize in the field of their choosing, and still, reap all the benefits of an all-around safe ecosystem. And we believe in empowering creative threat hunters to build solutions that can analyze and defend us at all levels of infrastructure from Layer 2 all the way to within the inner-logic of our applications. For this, we need a new model of thinking about the security of complex systems.

We propose a new standard model for authorization and blockchain-based authorization auditing.