What Are Blockchain Bridges and Why Do They Keep Getting Hacked?

December 18, 2023 11:19 pm Published by

Therefore, to redeem assets locked on the source blockchain, users must burn their wrapped assets on the target blockchain. Burning simply refers to https://www.xcritical.com/ the process of sending assets to an address to which no one holds the private key required to move received tokens. Bridges are either custodial (also known as centralized or trusted) or noncustodial (decentralized or trustless).

  • To guarantee a smooth user experience and prevent congestion, bridges must tackle scalability and high availability.
  • If the latter is neglected, an attacker could deploy a malicious contract to forge a deposit event with the same structure as a legitimate deposit event.
  • Thus, local verification is mostly used in cross-chain liquidity protocols involving liquidity pools that exist independently on each chain.
  • The platform’s bridge is compatible with many well-known blockchains, including Dogechain, Harmony, Ethereum, BNB Chain, and Polygon.
  • An example is Ethereum as an L1 main chain, with Arbitrum as its official L2 side chain.

Blockchain Bridges : A deep dive into Cross-Chain Interoperability

In fact, you drive up to one side of the bridge, leave your vehicle in a parking garage, walk across, and pick up a rental car on the other side. Then, when you’re done driving around the other island, you bring your rental how do crypto bridges work back to the bridge, walk across, and they hand you the keys to your car. In short, bridges are the weak point in a lot of cryptocurrency systems, and hackers are targeting them for more than $1 billion in little over a year.

What Are Blockchain Bridges and How Do They Work?

While this approach reduces the reliance on a single entity, it is more inefficient because multiple nodes need to communicate to approve a message and relay it to the other chain. The more nodes in the middle, the more inefficient the bridge will be, but a compromise of a majority share of nodes by a malicious external entity becomes less feasible, too. But right now, a surprisingly large number of projects don’t have any auditor listed. Advertise with Blockchain Magazine and connect with a highly engaged global audience. 1/ I’ve been highly critical of Ethereum and the first generation of rollups because of their lack of ability to natively communicate with each other without the need for bridges.

Cryptocurrency Basics: What Is Crypto, How It Works & What’s It Used For?

Risks of Blockchain Bridges

Users first deposit assets to a smart contract on the source blockchain to bridge their assets using a trust-minimized implementation. The protocol generates proof of the transaction’s validity using the block header. A relayer script then communicates block headers from the source blockchain to the target blockchain. For the protocol to authorize a wrapped asset mint, users must submit the proof they received. The light client can then cross-reference it with its complete block header history, confirming or rejecting its validity. In the multichain future we’re rapidly moving toward, blockchain bridges play an increasingly important role.

The Problem Blockchain Bridges Solve

These chains can mint NFTs directly, leveraging established bridges to attract early liquidity and users from diverse blockchain ecosystems. In essence, NFT bridges empower protocols and dApps to break free from their original chains, embrace multi-chain functionality, and chart their own independent yet interconnected futures. Remember, while bridges offer distinct advantages, they may involve slightly higher fees compared to centralized exchanges. Additionally, their value shines brightest when seeking opportunities for the same asset across different networks.

The platform’s bridge is compatible with many well-known blockchains, including Dogechain, Harmony, Ethereum, BNB Chain, and Polygon. While a bridge can alleviate congestion on a busy network, moving assets away to another chain doesn’t solve the scalability issue as users won’t always have access to the same suite of dapps and services. For example, some Ethereum dapps are not available on the Polygon Bridge, which limits its scaling efficacy.

Risks of Blockchain Bridges

Thus, local verification is mostly used in cross-chain liquidity protocols involving liquidity pools that exist independently on each chain. Some externally verified bridges are secured by multisig wallets.Ronin is one example. Multisig wallets arealso referred to as m-of-n multisigs, with M being the required number of signatures or keys and N being the totalnumber of signatures or keys (m≤n). This means that an attacker only needs to exploit M keys to be able to hack thewhole system.

In this case, Arbitrum has a native bridge(opens in a new tab) that can transfer ETH from Mainnet onto Arbitrum. Custodial bridges require users to place their trust in a central entity to properly and safely operate the system. Interoperability—the ability for different systems to communicate—wasn’t a consideration in the early days of blockchain technology.

Build your identity as a certified blockchain expert with 101 Blockchains’ Blockchain Certifications designed to provide enhanced career prospects. For example, providing general guidelines to ensure an error-free verification process is challenging since each bridge has unique verification requirements. The most effective approach to prevent verification bypass is to thoroughly test the bridge against all possible attack vectors and ensure the verification logic is sound. A manual checkpoint is similar to a trusted model as it depends upon a third party, i.e., the officials, for its operations.

With assets now free to roam across chains, discrepancies in prices and conditions become ripe territory for exploitation. He meticulously scans liquidity pools across various chains through bridges, spotting a juicy opportunity. Ethereum yields a measly 5% on his stablecoin, while Fantom beckons with a tempting 12%. With a simple move, Bob bridges his stablecoin over, maximizes his returns, and bridges it back, pocketing the handsome interest differential.

Certain coins being incompatible with other, popular networks, presents a significant barrier to widespread adoption and adds a layer of complexity to navigating the DeFi sphere. For example, the two biggest blockchains in the world are Ethereum and Bitcoin. However, investors generally can’t use BTC on Ether-based applications, and vice versa. Of course, one could trade their BTC for ETH on a well-known crypto exchange, but this incurs transaction fees and is generally time-consuming. The internet is a revolutionary system partly because of its high interoperability.

Blockchain bridges can solve this issue, enabling tokens to move seamlessly across different blockchains. By allowing assets to move seamlessly across different blockchains, these bridges can streamline cross-border payments, reducing transaction times and costs. Burn & Mint bridges bear many resemblances to lock and mint bridges but are non-reversible.

Blockchain bridges can be categorized according to their functions, mechanisms, and levels of centralization. Each of these bridges has its own features, strengths and weaknesses, which are important to consider when choosing the right solution. In order to choose the right bridge for your needs, it is necessary to study the functionality of each of them in detail.

They also lower transaction fees and enhance speed, especially with layer two solutions. As the blockchain space developed and expanded, one of the most significant limitations has been the lack of capacity of different blockchains to work together. Blockchain bridges help break up these silos and bring the isolated crypto ecosystems together.

In most blockchain bridges, a privileged role is responsible for whitelisting or blacklisting tokens and addresses, assigning or changing signers, and other critical configurations. Ensuring that all configurations are accurate is crucial, as even seemingly trivial oversights can lead to significant losses. In addition, blockchain bridges have a large attack surface as they involve many components. With that in mind, malicious actors are highly motivated to target cross-chain applications to drain large sums of funds.

Categorised in:

This post was written by admin