Security is not a binary state. It is a relationship between what you protect, who you protect it from, and what resources they command.
The Marmot Protocol's threat model does what every security document should: it names specific adversaries, details how the protocol defeats each one, and admits where cryptography alone cannot save you. This matters because matching a protocol's actual defenses to your actual situation is the difference between security and security theater. nostr:naddr1qqgrsvrp8p3xxetzxvmnqdtzxejnsq3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65w0wylh7