Add some notes on bridge

This commit is contained in:
BT3GL /baɪtɡɝɫ/ 2022-04-27 07:17:56 +04:00 committed by GitHub
parent 9d5cd39cdf
commit 19ba72145e
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

29
DeFi/bridges/README.md Normal file
View file

@ -0,0 +1,29 @@
## Bridges
<br>
### Centralized Bridge
* Centralized bridges are essentially hot wallets straddling the fence between multiple chains.
* They hold a users assets on one chain and issue them a corresponding amount of tokens on another chain.
* Liquidity on both sides is managed by the centralized entity.
* Binance is probably the best example of a centralized bridge operator, straddling the fence between Ethereum and Binance Smart Chain.
* The security risks of a centralized bridge are the same security risks that exist for exchanges and custodians.
* Their primary responsibility is securing private keys (key management), and as a result centralized bridges have proven to be pretty secure.
### Proof of Stake Bridge
* Proof of Stake bridges are like little blockchain networks narrowly focused on facilitating cross-chain activity.
* Whereas centralized bridges are managed by a single entity, proof of stake bridges are managed by a group.
* They often involve multisigs or some form of escrow mechanism controlled by a group of signers/validators that watch and vote on the ability to unlock corresponding assets on another chain.
* Because POS bridges involve both smart contracts and a group of centralized gatekeepers, they inherit all the code risk of Web 3 and the traditional security risks of Web 2 (key management, access controls).
* POS bridges have the most attack vectors, and have unfortunately been the victims of most of the major exploits.
### Decentralized Bridge
* Decentralized bridges take a proof of deposit from one chain and validate it on the other chain (ex: Polygon Plasma Bridge).
* Decentralized bridges are all code. They dont rely on centralized signers/validators, so while theres more code risk, they dont have to worry about the traditional security risks that POS bridges deal with.
* Decentralized bridges are newer and facilitating less activity than the other bridge types, but there are no known exploits.