Adversary controls the network and may have arbitrary compute power.
- 51% hash attack → reorg/censorship.
- Eclipse → isolate node, censor mempool.
- Long-range → no historical binding once power drops.
- Cartelization → economic capture.
- Signature validity: verify(pubkey, canon(tx with sig=""), sig) must hold.
- Ownership: input.pubkey must equal UTXO.pubkey.
- Conservation: Σinputs ≥ Σoutputs (fee = difference).
- Fork choice: maximize cumulative difficulty.
- Declared limitation: no asymptotic security accumulation.
URC does NOT claim compounding security, permanent decentralization, or state-resistance.