A strong protocol should embrace [0] the realities of distributed settings, not willingly ignore them.
@Aljoscha there's more than one way to look at the "realities of distributed settings". 2 years ago i gave a talk on "nature's best practices for distributed systems" (video). the main point i learned from my research was that nature's primary strategy for security is the network topology, not sophisticated algorithms.