Content
During bridging, the asset control moves from the users to the centralized authority. Users have to “trust” the integrity and efficiency of the centralized entity to perform the transaction. Some blockchain bridges, such as “Cross-Chain Bridge” and Synapse Protocol, adopt different approaches. For instance, there are liquidity pools for WETH on BNB Chain, Polygon, and so on.
The Celer cBridge uses the Celer State Guardian Network to enable liquidity across different blockchains. Another approach to enabling cross-chain bridge transfers is by using a liquidity pool. With a liquidity pool, a cross-chain bridge provider holds inventory — or pools — of various coins where one can be exchanged for another. With fiat currency there are many established ways for individuals and businesses to exchange money, creating a globally available and interoperable system of financial payments. Those systems include financial institutions, banks and credit cards that handle foreign exchange.
Recent crypto bridge hacks
Let’s say you want to exchange ETH on Ethereum Mainnet for ETH onArbitrum ↗. Like the currency exchange we made for EUR, we need a mechanism to move our ETH from Ethereum to Arbitrum. In this case,Arbitrum has a native bridge ↗that can transfer ETH from Mainnet onto Arbitrum. We saw rates of just over $2 up to $14 to bridge a small amount of ETH across blockchains.

There is usually a group of validators that monitor a “mailbox” address on the source chain and, upon consensus, perform an action on the destination chain. An asset transfer is typically done by locking up the asset in the mailbox and minting the equivalent amount of that asset on the destination chain. These are often bonded validators with a separate token as a security model. After years of research & development, we are finally in a multi-chain market structure. There are over 100 active public blockchains, many of which have their own unique applications, users, geographies, security models, and design trade-offs. Despite what individual communities believe, the reality is that the universe tends towards entropy, and the number of these networks will likely continue to increase into the future.
Centralized or Trusted Blockchain Bridge
Improving blockchain networks’ interoperability and their widespread adoption depends on using https://xcritical.com/. The number of users, bridges, and overall transaction volume on these bridges have all increased exceptionally. As the Internet transitions to Web3, the blockchain bridge will also keep expanding in the future. Some do not find much success, while others establish themselves highly successfully.
- A trusted bridge is a cross-chain protocol controlled by a centralized entity.
- However, creating secure cross-chain bridges remains a challenging task in the crypto industry.
- The last piece of the puzzle was that Axie DAO had given access to Sky Mavis to sign on its behalf to deal with high user volume but it never revoked it afterward, leaving a potential backdoor.
- Therefore, they have an ecosystem that can connect to these blockchains.
- Cosmos is referred to as the “internet of blockchains” with several sovereign blockchains and the “Hub” chain.
The Wormhole protocol underpins the cross-chain Portal Bridge for Layer 1 and Layer 2 blockchains and now supports Algorand. Partnering with Algorand as a cross-chain composability system that allows NFTs to move freely between blockchains and launch cross-chain bridges for the Algorand ecosystem. Synapse Protocol enables cross-chain communication for facilitating transactions across blockchains. Blockchain bridges can also be useful in DeFi applications, allowing lenders and borrowers to convert tokens to their preferred blockchain.
Swim Protocol
You are giving up control of your cryptocurrency in order to convert them to cryptocurrencies on another chain. In addition to crypto and blockchain topics, Eric also writes extensively on insurance and personal finance matters that affect everyday households. In addition, the bridged tokens don’t always track the base coin or token in value. The difference in price can add up if you’re working with large amounts of crypto. Bi-directional bridges let you move the tokens back as well, but this might take a while — maybe even days.
The Nomad team requested that users who had obtained funds return them and retain 10% of the returned amount. Some of the stolen funds were successfully retrieved, with $32 million already returned by these so-called “white hat” hackers. The total value locked in the bridge was $190 million prior to the exploit, which resulted in almost the entire amount being drained. On the 2nd of February 2022, the Wormhole bridge was hacked for $236M worth of tokens . The attacker was able to bypass the signature verification by exploiting a deprecated and insecure function in the code. The attack came after a change in the code was pushed to the GitHub repository by a developer on the same date.
Filter bridges
The PowPeg is one of the most secured peg-based on the multi-signature (multi-sig) system. The bridge is decentralized and is secured by the underlying Bitcoin blockchain. The bridge is designed to allow Bitcoin users to send their what is a blockchain bridge BTC directly to the Polkadot network. The Gravity Bridge is built on the Cosmos chain and works alongside validators for minting tokens. The Bridge also uses relayers and transaction batching to reduce gas costs for token transfer.

Because blockchain bridges are still in the early stage of development, there are still some security concerns. These security concerns have led to security breaches on different blockchain bridges causing loss of assets. A significant limitation of blockchain solutions is the interoperability problem.
Find your bridge with the
Manual checkpoints are similar to a trusted model as it depends upon a third party, i.e., the officials, for its operations. As a user, you trust the officials to make the right decisions and use your private information correctly. If you have ETH on Ethereum Mainnet and you want to explore an alt L1 to try out their native dapps. You can use a bridge to transfer your ETH from Ethereum Mainnet to the alt L1.
How to Pay a BitPay Invoice with Polygon
The safest bet is probably to use a well-established bridge, like those covered above. In the next section, we’ll cover trust-based bridges, which are bridges run by people or organizations. While not a common problem, the crypto you deposit might not come out on the other side.






