TL;DR:TeQoin inherits Ethereum’s security through data availability on L1, fraud proofs for state validity, and economic incentives that make attacks unprofitable. Even with a malicious sequencer, user funds remain safe due to cryptographic proofs and decentralized verification.
🎯 Security Guarantees
What TeQoin Guarantees
Fund Safety
Your funds cannot be stolenEven with malicious sequencer
State Validity
All state transitions are validInvalid states are proven and reverted
Data Availability
All transaction data on L1Users can always reconstruct state
Censorship Resistance
Transactions cannot be censoredForce inclusion via L1
Liveness
System always operationalCan recover even if sequencer fails
No Custody
Self-custodialOnly you control your private keys
🏗️ Security Layers
Defense in Depth
Layer 1: Cryptographic Security
Foundation: Math and cryptographyGuarantees:
- Only private key owner can sign transactions
- Signatures cannot be forged
- State roots cannot be faked
- Requires breaking ECDSA (computationally infeasible)
- Would need to break SHA-256 class hashes
Layer 2: Smart Contract Security
L1 contracts enforce rulesGuarantees:
- Code is law (deterministic execution)
- No admin keys can bypass rules
- Audited by multiple firms
- Battle-tested on Ethereum
- Would need to exploit smart contract bugs
- Multiple audits reduce risk
- Time-tested patterns used
Layer 3: Fraud Proof Security
Invalid states are provably detectedGuarantees:
- Any invalid state can be proven wrong
- Proof verified on-chain (trustless)
- Malicious sequencer slashed
- Correct state restored
- Would need all verifiers to collude
- Economic incentive ensures verification
Layer 4: Economic Security
Rational actors stay honestGuarantees:
- Honest behavior is most profitable
- Fraud is always caught (7-day period)
- Penalties exceed any possible gain
- Would require irrational economic behavior
- Would need to sacrifice massive value
🎭 Threat Model
Attack Scenarios & Defenses
1. Malicious Sequencer Attempts Theft
1. Malicious Sequencer Attempts Theft
Attack: Sequencer tries to steal user fundsMethod:Defense:Result: ✅ Attack fails, attacker loses stake
2. Sequencer Censors User Transactions
2. Sequencer Censors User Transactions
Attack: Sequencer refuses to include user’s transactionsMethod:Defense:Result: ✅ Censorship impossible long-term
3. Sequencer Goes Offline
3. Sequencer Goes Offline
Attack: Sequencer stops producing blocks (DoS)Method:Defense:Result: ✅ System remains operational
4. Verifiers Collude with Sequencer
4. Verifiers Collude with Sequencer
Attack: All verifiers agree to ignore fraudMethod:Defense:Result: ✅ Attack requires bribing everyone (impossible)
5. L1 Contract Exploit
5. L1 Contract Exploit
Attack: Find bug in L1 smart contractsMethod:Defense:Result: ⚠️ Low risk but possible (mitigated heavily)
6. 51% Attack on Ethereum L1
6. 51% Attack on Ethereum L1
Attack: Attacker controls Ethereum consensusMethod:Defense:Result: ⚠️ Inherits Ethereum’s security assumptions
💰 Economic Security Analysis
Cost-Benefit for Attackers
- Attack Costs
- Defender Incentives
- Nash Equilibrium
What would attacks cost?
Takeaway: All attacks are either impossible or economically irrational
| Attack Type | Cost | Success Probability |
|---|---|---|
| Steal funds (sequencer) | 36M/year revenue | 0% (fraud proof) |
| Censor transactions | $10M stake + reputation | 0% (force inclusion) |
| Bribe all verifiers | Infinite (permissionless) | 0% (need everyone) |
| 51% Ethereum | $20B+ | ~0% (social consensus) |
| Smart contract exploit | Research time + $1M bounty | 1% (audited) |
🔐 Security Assumptions
What We Trust
- Cryptographic Assumptions
- Ethereum L1 Security
- Economic Assumptions
- What We DON'T Trust
We assume these are secure:✅ ECDSA (secp256k1)
- Used for signatures
- Same as Bitcoin/Ethereum
- No known attacks
- Used for hashing
- Cryptographically secure
- Collision resistant
- State commitments
- Mathematically proven
- Tamper-evident
🛡️ Security Best Practices
For Users
Secure Your Private Key
Critical:
- Use hardware wallet (Ledger, Trezor)
- Never share private key
- Backup seed phrase securely
- Use strong passwords
Verify Transactions
Before signing:
- Check recipient address
- Verify amount
- Review contract interactions
- Check network (L1 vs L2)
Use Official Interfaces
Only trust:
- https://bridge.teqoin.io
- https://rpc.teqoin.io
- Official documentation
- Verified contract addresses
Start Small
Test first:
- Send small amount initially
- Verify it arrives
- Then send larger amounts
- Don’t risk everything at once
For Developers
Audit Your Contracts
Before mainnet:
- Multiple security audits
- Formal verification if possible
- Bug bounty program
- Test on testnet extensively
Handle Reorgs
L2 blocks can reorg:
- Wait for L1 finality (7 days)
- For soft finality, wait 5-10 blocks
- Don’t assume instant finality
- Handle reorg scenarios
Validate Inputs
Never trust user input:
- Validate all addresses
- Check amount bounds
- Verify signatures
- Sanitize data
Plan for Emergencies
Emergency procedures:
- Pause mechanisms
- Upgrade paths
- Recovery procedures
- Communication plans
📊 Security Comparison
TeQoin vs Other L2s
| Security Aspect | TeQoin | Optimism | Arbitrum | zkSync | Polygon |
|---|---|---|---|---|---|
| Data Availability | L1 | L1 | L1 | L1 | Sidechain |
| Validity Proofs | Fraud Proofs | Fraud Proofs | Fraud Proofs | ZK Proofs | None |
| Withdrawal Time | 7 days | 7 days | 7 days | Hours | Instant |
| Sequencer | Centralized* | Centralized* | Centralized* | Centralized* | Validators |
| EVM Compatibility | 100% | 100% | 99%+ | ~95% | 100% |
| Security Level | Ethereum | Ethereum | Ethereum | Ethereum | Lower |
🔬 Formal Security Properties
Mathematical Guarantees
Safety
Safety
Nothing bad ever happensFormal property:In English:
For any state transition, either:
- It’s valid according to EVM rules, OR
- There exists a fraud proof proving it’s invalid
Liveness
Liveness
Something good eventually happensFormal property:In English:
For any transaction, either:
- It will eventually be included by sequencer, OR
- User can force inclusion via L1
Data Availability
Data Availability
All data is always availableFormal property:In English:
For every L2 block:
- Transaction data exists on L1
- Available to all participants
- Cannot be hidden or deleted
🎯 Security Guarantees Summary
What You Can Trust
Your Funds Are Safe
✅ Cannot be stolen by sequencer
✅ Cannot be frozen indefinitely
✅ Can always be withdrawn (7 days)
✅ Protected by Ethereum L1 security
✅ Cannot be frozen indefinitely
✅ Can always be withdrawn (7 days)
✅ Protected by Ethereum L1 security
State is Valid
✅ All state transitions follow EVM rules
✅ Invalid states are proven and reverted
✅ Economic incentive ensures verification
✅ Fraud proofs work automatically
✅ Invalid states are proven and reverted
✅ Economic incentive ensures verification
✅ Fraud proofs work automatically
Censorship Resistant
✅ Transactions cannot be censored permanently
✅ Can force inclusion via L1
✅ Can exit system anytime
✅ Sequencer slashed for censorship
✅ Can force inclusion via L1
✅ Can exit system anytime
✅ Sequencer slashed for censorship
📚 Additional Resources
Fraud Proofs
How fraud detection works
Optimistic Rollup
Core technology explained
Sequencer Design
Block production system
Challenge Period
Why withdrawals take 7 days