Just tidying up the desk and found an old alarm clock, which made me think that cross-chain technology is also quite similar to an alarm clock: you think pressing it once will make it ring, but actually there are a bunch of gears inside biting each other. Once IBC/message passing goes through, to be honest, you have to trust: the source chain won't rollback, the verification/light client won't fail, the relayer won't slack off or act maliciously, and if there's a multi-signature/watcher/oracle involved in the bridge, then there are even more layers of "I hope you're a good person." Recently, in the group chat, people are arguing about privacy coins, coin mixing, and compliance boundaries. Watching this, I understand even more: what everyone is fighting over isn't just technical terms, but "who are you willing to trust, and to what extent." Tonight, I plan to draw this trust chain as a gear diagram of an alarm clock... Maybe as I draw, the comment section will lead me off-topic again. Never mind.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin