The official document of the project should clearly specify or prove how the underlying technology addresses the most commonly known security attacks. 

Did this answer your question?