Cointime

Download App
iOS & Android

Bridges: Blockchains’ Communicators and Connectors

Validated Project

Cross-chain bridges, otherwise called blockchain bridges, are protocols allowing users to move assets between two certain blockchains by connecting them just like physical bridges would connect two river banks. Without bridges, it wouldn’t be possible to simply send funds and NFTs from one chain to another, since every blockchain is designed in an isolated environment and has its smart contract and native tokens. To some extent, this is similar to currencies, as those issued in one country cannot be accepted as payment in another.

Cross-chain bridges ensure seamless transfers of various token types (ERC-20, BEP-20 and others) across blockchains. They also facilitate movement of funds between blockchains built on different technologies (Bitcoin, Ethereum, Litecoin, Dogecoin), as well as between Ethereum and its L2 chains (Arbitrum, Optimism and Polygon).

Why bridges are crucial for blockchain interoperability

A user goes to a bridge for multiple reasons. The most common one is getting a native crypto asset of another blockchain, for example, BTC, when having funds only on Ethereum or vice versa. Bridges make it possible to get other blockchains’ tokens without going through exchanges, which can sometimes be an expensive and pretty long process. Bridges also solve the issue of using dApps on different core networks by helping to transfer native tokens to interact with a platform running on another L1 blockchain.

And on top of that, L2 solutions continue to evolve, enabling users to benefit from lower gas fees and more favorable lending platform terms when interacting with them. To embrace features that the main chain might lack, users need to bridge tokens from L1 to L2, for example, ETH from Ethereum Mainnet to Arbitrum or Optimism.

Bridge types and working principle

Most commonly, when tokens are sent between chains over bridges, an amount of chain A’s token is locked in a smart contract. Then, an equivalent amount of chain B’s token is minted. Once those “newborn” tokens appear in the user’s wallet, they can be freely moved and used within any protocol and platform that supports chain B. For instance, ETH bridged via Polygon, enables users to trade, lend, stake and conduct any other activity within the network. However, tokens can always be converted back to the origin blockchain version.

Just like exchanges and tokens, bridges can be centralized or decentralized.

Centralized, or trusted bridges rely on some type of central authority–this means that users have to trust the intermediary.

Decentralized, or trustless bridges are those in which users do not have to rely on a single entity or authority, but only trust the code.

Typical bridge risks and the ways to avoid them

Trusted bridges have all risks related to centralization where users have to rely on the bridge operator’s reputation and where they don’t have control of their crypto assets. Hacking into a central node and taking over a blockchain bridge is attractive for malicious actors who can steal customers’ funds or mint non-collateralized tokens.

Trustless bridge security is similar to that of the underlying blockchain. While immune from centralization-related risks, trustless bridges are still vulnerable to bugs in their software and coding.

In addition, both centralized and decentralized bridges share the common risks of code and security design attacks.

Malicious actors take advantage of errors in codes and vulnerabilities in smart contracts. They exploit traditional social engineering attacks, a current favorite hackers vector, not only bridges are suffering from.

One more common threat is the validators´ node, which can be also compromised. Hackers can get control of validators, especially if there is a small group of them.

Safety measures to follow

To avoid security risks, users have first to check whether there is a published audit confirming the quality of smart contracts that power the bridge. Audit reports are always publicly available.

It’s also important to make sure the target chain has sufficient liquidity of required tokens.

Regular smart contracts auditing and publishing are the most important proof of code and bridge reliability. As hacker attack schemes evolve, smart contracts security must be one step further.

If choosing a trusted bridge, it is worth exploring its custody reputation and previous attacks` history.

The number of validators is also a crucial factor. The more validators, the better decentralization and, therefore, security. Some of the recent big attacks exploited the small number of validators.

Easily bridging with 1inch

1inch provides a choice of nine blockchains, including L2 solutions, to operate with. Bridges enable users to take advantage of all of them in a fast and straightforward way. All bridging options appear right after clicking the “Bridges” tab in the 1inch dApp, then the selected bridge offers to connect the wallet to deposit, convert and withdraw users´ tokens and enjoy interaction with a different network. But users must be aware that converting tokens from Ethereum to its L2s and xDai, just like regular transactions, requires some ETH for gas fees. Here you can find a step-by-step guide on how to bridge via 1inch.

https://blog.1inch.io/bridges-blockchains-communicators-and-connectors-e29b416478a7

Comments

All Comments

Recommended for you

  • BTC breaks through $69,000

     the market shows BTC breaking through $69,000, currently at $69,021.49, with a 24-hour increase of 1.15%. The market is highly volatile, please manage your risk accordingly.

  • Spanish Foreign Minister: Not worried about any consequences of refusing US access to military bases

     on March 3 local time, Spanish Foreign Minister Alvarez defended the Spanish government's refusal to provide the Rota and Moron military bases to the United States for participation in attacks on Iran. Alvarez stated that the operation initiated by the United States and Israel is not supported by the United Nations and is not part of the bilateral agreements allowing the use of the aforementioned Spanish sovereign military bases. Alvarez also said that the Spanish government is not concerned that this stance will have any consequences. Alvarez stated: "The position of the Spanish government represents the will of the vast majority of the Spanish people as well as the vast majority of people worldwide, which is to defend the UN Charter, respect international law, and believe that cooperation is always more powerful than confrontation."

  • Spot gold plunges nearly $100 in the short term.

     spot gold plunged nearly 100 dollars in a short time, spot gold fell below 5170 dollars/ounce, with a daily decline of 2.94%. 

  • BTC falls below $67,000

    the market shows BTC fell below $67,000, currently at $66,996.93, with a 24-hour increase of 1.18%. The market is highly volatile, please manage your risk accordingly.

  • ETH breaks $2,000

    the market shows ETH breaking through $2000, currently at $2001.64, with a 24-hour increase of 2.89%. The market is highly volatile, please manage your risks accordingly.

  • The US spot Bitcoin ETF saw a net inflow of $962.48 million yesterday.

    according to Trader T's monitoring, the US spot Bitcoin ETF had a net inflow of 962.48 million USD yesterday.

  • BTC falls below $66,000

     the market shows BTC fell below 66,000 USD, currently at 65,986.66 USD, with a 24-hour decline of 1.31%. The market is highly volatile, please manage your risks accordingly.

  • BTC falls below $66,000

     the market shows BTC fell below $66,000, currently at $65,973.16, a 24-hour drop of 2.66%. The market is highly volatile, please manage your risks accordingly.

  • ETH breaks $2,000

    market shows ETH breaking through $2000, currently at $2000.29, with a 24-hour increase of 3.73%. The market is volatile, please manage your risk accordingly.

  • The United States uses Anthropic's artificial intelligence technology in its airstrikes in the Middle East.

     United States used Anthropic's artificial intelligence technology in airstrikes in the Middle East, and just hours before the attack, Trump had just issued a ban against Anthropic.