Denial of Service

<<Communicating Conspirators<< Up to Prevention >>Exhaustion>>

Service can "only" be denied Invulnerable
Concurrency Consistency
Safety
Deadlock-free
Liveness
Networks Integrity
Authenticity
Secrecy
Non-partition
Guaranteed delivery
Hardware Tamper detecting
"Opaque boxes"
Cheyenne Mountain
Resources Resource Exhaustion Attacks Agoric Systems
Meters, Space banks, Keepers