Add more comments about timelock assumptions and security model