Security Proof Dashboard

Experimental attacks on Trust Stack Network — all results reproducible from source

Implementation
Network & Consensus
Quantum Resistance
Methodology

Methodology & Transparency

Every test runs against the exact same cryptographic libraries used in TSN's production code. No mocks, no simplified versions.

What we test

  • Signature correctness, forgery resistance, key uniqueness (ML-DSA-65)
  • Hash determinism, avalanche, collision resistance (Poseidon2, SHA-256, BLAKE2)
  • Encryption roundtrip, tamper detection, IND-CPA (AES-256-GCM, ChaCha20)
  • 51% attack, selfish mining, eclipse, timestamp manipulation
  • Quantum resource estimation and threat timeline

What we don't claim

  • Mathematical proof of unconditional security
  • Resistance to unknown future attacks
  • That quantum simulations at 30 qubits prove anything at scale
  • That any system is "unbreakable"

Post-Quantum Comparison

PrimitiveTSNBitcoinEthereumQuantum Status
SignaturesML-DSA-65 (lattice)ECDSA secp256k1ECDSA secp256k1TSN safe / BTC+ETH: Shor ~2035
PoW HashPoseidon2SHA-256dN/A (PoS)All safe (Grover: 2^128)
ZK ProofsPlonky2/3 STARKsNoneGroth16 (pairings)TSN hash-based / ETH: Shor
EncryptionAES-256-GCMNoneNone128-bit post-quantum