# Security

1Money Network's BCB / BFT protocol design, with its instant finality, prevents a category of economic attack (such as Long Range, 51% attacks) that are a persistent tail risks for Proof of Stake, Proof of Work blockchains. This enables 1Money Network to be an ideal protocol for RWA tokenization, stablecoins and other use cases with unlimited value stored on chain.&#x20;

The 1Money Network operates under a robust security model that ensures the integrity and reliability of the network. The network assumes a partially synchronous network environment, where message delivery times are bounded. This assumption, while necessary for checkpointing, does not impact the safety and liveness of the payment system, which can function in a fully asynchronous network.

To safeguard the network, the protocol relies on a public key infrastructure to verify the authenticity of validators' signatures. This infrastructure is established through governance certificates, which require the signature of a trusted operator. While this assumption simplifies the security model, it's important to note that alternative approaches could be implemented to eliminate the need for a trusted operator.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://developer.1moneynetwork.com/core-concepts/security.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
