Unlocking the Potential - Chapter 3: An Overview of Bifrost’s Security Model