Threat Model

How the system resists spam, fake venues, and manipulation.


Any system that influences where people stay and spend money will attract bad actors.

Threats and defences

Fake venues
SEO manipulation
Fake Curators
Review manipulation
Bait and switch

Design principles

Multiple attestation

No single point of trust. Convergent evidence from independent sources.

Transparency

Interests declared, sources cited. Nothing hidden.

Earned reputation

Trust built through behaviour over time, not self-assertion.

Graceful degradation

System works even if some actors are bad.

Full analysis

See the Curator Threat Model for detailed analysis.