🎄 Cryptonary Christmas Sale! 50% OFF. Save $500 Now Only ⏰ : 0d 11h 6m 29s

However, there is one solution that we have not covered – bridges. Cross-chain bridges are the most commonly used method of moving assets between chains. But why have we left them till last?
Well, bridges come in many forms – and a few of the bridges out there also utilize concepts covered in the previous journals. So, without further ado, let’s dive into the expansive (and sometimes controversial) world of cross-chain bridges!
The same is true for any wrapped asset – they are merely representations, not the real thing. For most intents and purposes, however, they are effectively an I.O.U. receipt. Remember when traditional currency was redeemable for gold or other precious metals? Me neither, but apparently, it was the standard:

That’s essentially what a wrapped asset is – WBTC is a banknote, BTC is the gold.
So, how is this done? There are a few methods depending on the bridging protocol, the chains involved, and the asset being bridged – let’s have a look!

One of the main issues with this is that the system is not completely trustless. Most protocols using this method have “in-between” validators that run a full node on each chain on each side of the bridge. Generally, these validators are only a few individual entities (in the case of Wormhole, only 19 “Guardians”). Locked assets are also in the custody of the bridging protocol until redeemed.
This brings into question the level of decentralization of the bridge and the trust placed in the bridging protocol – what happens if a majority of these validators decide to act maliciously? Or a majority of validators are compromised in a hack or exploit? Someone manages to send false information to one or both sides of the bridge? Nothing good, to say the least.
With billions of dollars worth of native assets locked on one side of a bridge, and the ability to technically mint unlimited wrapped assets on the other, security is of major concern for bridges, and indeed the largest DeFi exploits have mostly come from bridge exploits. The main point of weakness is the part “in-between” the chains.
Still, there is the weak point of the “in-between” part, whereby a lot of trust is placed in a few validators. Additionally, since base layer assets such as Solana (SOL) cannot exist anywhere other than on the Solana blockchain, there is still the necessity for wrapped assets if the user wishes to keep exposure to/use the base assets on other chains.

The above is an example of a few Synapse Protocols ETH pools – the protocol has created a derivative nETH that is backed by ETH locked by users. By using nETH as the common denominator between various chains, they can establish a network of liquidity between these pools without the user having to bridge back to the Ethereum network before moving to their chosen destination chain.
One of the main security concerns is the use of wrapped assets, which has been a major pain point for cross-chain comms. The trust placed in the protocols that these wrapped assets is huge and there are no guarantees that they won’t lose user funds locked in their vaults. Additionally, the minting process is largely a centralized ordeal – remember the I.O.U example we used earlier? Again, there’s no guarantee that wrapped assets will be redeemable for the underlying asset – only a “trust me bro” from the protocol or organization that minted them (for the most part).
Still, wrapped assets are still a necessity. But as we’ve seen in the past with the many bridge exploits involving wrapped assets, the infrastructure for managing those processes could be more refined, trustless, and decentralized. There’s always room for improvement.