The first considerations regarding the security assumptions that characterize a blockchain must be conducted with reference to the architectural differences of blockchains, with respect to traditional application solutions. The comparison must, therefore, be made between two different application design models: a centralized model and a decentralized one, adopted in the development of applications.
Let's start with the first one, the centralized model, which is typical of the internet since its origins.