Threat Model
How the system resists spam, fake venues, and manipulation.
Any system that influences where people stay and spend money will attract bad actors.
Threats and defences
Fake venues
SEO manipulation
Fake Curators
Review manipulation
Bait and switch
Design principles
Multiple attestation
No single point of trust. Convergent evidence from independent sources.
Transparency
Interests declared, sources cited. Nothing hidden.
Earned reputation
Trust built through behaviour over time, not self-assertion.
Graceful degradation
System works even if some actors are bad.
Full analysis
See the Curator Threat Model for detailed analysis.