We begin by stating some assumptions about how irker will be deployed,
and articulating a set of security goals.
-Communication flow in an irker deployment will looks like this:
+Communication flow in an irker deployment will look like this:
+-----------------------------------------------------------------------------
Committers
|
|
|
|
IRC servers
+-----------------------------------------------------------------------------
Here are our assumptions: