Tonight I’m again reviewing the design of IBC and various "messaging/bridging" systems, my eyes are a bit sore, staring at those flowcharts is more tiring than watching candlestick charts… Honestly, there’s quite a lot you need to trust in a cross-chain transfer: the source chain must not rollback, validators shouldn’t act maliciously; although relays shouldn’t custody funds, if they feed you false information, it’s also very uncomfortable; the target chain must correctly verify that proof, and the contract implementation shouldn’t be flawed. The relatively better aspect of IBC is “laying out trust transparently,” but many bridges turn into trusting a multi-sig or an external verification network, and as the unlocking pressure increases, everyone rushes to cross, pushing the risk under the rug with emotions. Recently, hardware wallets are out of stock, and phishing links are everywhere… Anyway, before cross-chain transfers, I always pause for two seconds, minimize sharing addresses, domains, and authorizations, don’t shout safety while slipping up. That’s it for now, instant noodles time.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin