Cascade Security Model

An overview of the Cascade security model
The Cascade security model is akin to the security model of major optimistic sovereign rollups such as those found on Celestia.
  • Security: the cost to alter history
  • Permissionless: anyone can participate in the protocol
  • Trust: assumptions so funds cannot be frozen or stolen
  • Throughput: the ratio of transactions per second to the cost of running a full node
The goal of Cascade is to bring into the world a hyper scalable, secure, permissionless, trust-minimized, and high throughput SVM rollup.