Bridge Security: New Tech Means Bridge Hacks Should be Just a Memory

2022-5-25 03:56

Bridge Security: The interoperability trilemma of bridges needs a rethink. Data Journalist Daniel C. Park explains what is in the pipeline to prevent bridge hacks.

At Nomad, we are working on a new category of bridges. They are designed to reduce the worst-case scenario of a bridge hack. We are trading-off latency for security. We feel that this is a more compelling situation, against a backdrop of bridges that have been robbed of a billion dollars this quarter alone.

Successful exploits of QBridge ($80m), Wormhole ($326m), and Ronin ($624m) are powerful reminders that the interoperability trilemma of bridges needs a total rethink. A desire for anti-fraud features has intensified among bridge users. And that’s the problem we are solving.

Using Covalent’s application programming interface (API), we can trace how bridge users on Ethereum and Moonbeam are responding to Nomad’s security appeal. Nomad’s post-launch figures, such as total unique addresses and TVL per user, signal a promising outlook for optimistic systems.

Bridge Security: Has cross-chain bridge security reached an impasse?

At Nomad, we are challenging the proliferating narrative that cross-chain bridges, despite their enormous economic utility, had become too risk-prone to exploits. Even a 51% attack on a small-cap chain, due to overlapping derivatives, can compromise interconnected chains.

Vitalik’s Tweet on cross-chains (Twitter).

Vitalik had pioneered and floated this perspective in January this year, citing “fundamental security limits of bridges,” and that cross-chain bridges should be regarded as an interim solution to advancing chain interoperability.

However, Nomad’s radical features, such as optimistic verification, advance a counter-narrative to this growing perception that bridge technology had reached an impasse. 

Sacrificing latency for absolute security

Echoing the predicament observed in the scalability trilemma, bridges too must traditionally forego at least one of three desirable properties – trust minimization, generalizability (support transferring arbitrary data), and extensibility (across as many heterogeneous chains).

The interoperability trilemma (Connext).

Departing from the trilemma, Nomad unorthodoxically sacrifices latency as a means to provide a security-first interoperability solution. Patterned after optimistic rollups, Nomad minimizes the visibility of attestation on-chain, and accepts it as valid within a fraud-proof window of ~30 minutes. 

Bridge Security: Insuring against the loss of any funds

Within this timeframe, data on Nomad is essentially cycled between an Updater, who signs and uploads the data to the origin chain; and a Watcher, who detects and reacts to faulty attestations.

Uniquely, departing from classical optimistic protocols, Nomad necessitates that an Updater submit a bonded stake on the origin chain. This insures Nomad’s security against the possibility of even a trusted Updater corroborating fraud.

Nomad’s architecture

In the event an honest Watcher proves fraud, the communication line from the origin to the destination chain is immediately severed, slashing the Updater’s bonds; and channeling the retrieved funds to the disputing Watcher.

That means, the bridge will be shut down, instead of users being robbed of any funds. Absence of fraud, alternatively, facilitates the data towards the destination chain as originally intended.

Fooling hackers with a single honest verifier

Already, Rainbow Bridge for NEAR protocol is corroborating the security merits of optimistic designs, having repelled an attack on May first this year.

Prominently, Nomad’s bridge security follows a single honest verifier assumption, only requiring  1 of n  actor(s) to validate transactions. In contrast, externally verified bridges are typically based on an honest majority assumption, where  m of n  participant(s) oversee the validation scheme.

Because of this, enabling permissionless Watchers that could be deployed by any Nomad user would make it impossible for hackers to know there is not at least one-single Watcher overseeing every transaction.

Optimistic systems, in this way, raises the economic cost for malicious actors (gas fees and the stake bonded by the Updater) to compromise their targets, with very little guarantee.

How is Nomad’s security proposition appealing to bridge users?

The technology Nomad builds on is battle-tested. Through Covalent’s unified API, we can see whether Nomad is properly capitalizing on its security appeals and accumulating a dedicated user base. 

TVL per user – Nomad vs. The Avalanche Bridge (Covalent).

Notably, compared to the more commercially mature Avalanche Bridge, Nomad’s TVL per user averaged higher numbers. Recording between $30-$40k daily per user since March 2022, Nomad’s figures outcompete that of Avalanche, which spanned between $20-$30k daily.

The disparity between the Avalanche Bridge and the newer Nomad bridge suggests a deep trust in Nomad’s security and anti-fraud features among bridge users.

Nomad’s cumulative total unique addresses (Covalent).

Likewise, the first week of May alone saw 5,000 new addresses bridge with Nomad. This is exponential growth considering Nomad took three-months to reach 3,000 unique addresses, illustrating that Nomad’s security appeals are marketable and perceived valuable by a wider array of bridge users.

Using Connext to solve Nomad’s latency shortcomings

The slow latency of ~30 minutes remains a glaring drawback for the bridge. Because of this, Nomad partnered with Connext, a cross chain liquidity network built on Ethereum as a L2 with much faster speeds.

How Nomad x Connext work together (Connext).

The modularity of layering Nomad and Connext together is another radical reapproach to the trilemma their partnership introduced. Connext properly fills the gap in speed Nomad was forced to forgo.

By doing so, the harmonized dual-system dynamically routes and modulates transactions, depending on the size of the asset being transferred and the liquidity pool corresponding to the asset.

Cross-chain bridge security is evolving with “stackable” bridges

As their synergy scales into a larger operation, Nomad can be tailored to focus further on institutional capital. Whereas, end users opting for smaller and faster transactions can be routed via Connext.

The security appeals of Nomad and corresponding growth figures, in retrospect, illustrate a pivotal moment in the history of cross-chain bridges.

We are aiming for a departure from the series of high-profile bridge hacks stunting the advancement of chain interoperability.

About the author

Daniel C. Park originally entered the Web3 space in 2019 researching blockchain’s utility in humanitarian affairs with Starling Lab at Stanford. He currently works as a Data Journalist at Covalent.

Got something to say about bridge security or anything else? Write to us or join the discussion in our Telegram channel. You can also catch us on Tik Tok, Facebook, or Twitter.

The post Bridge Security: New Tech Means Bridge Hacks Should be Just a Memory appeared first on BeInCrypto.

Similar to Notcoin - TapSwap on Solana Airdrops In 2024

origin »

Bridge Protocol (TOLL) на Currencies.ru

$ 0 (+0.00%)
Объем 24H $0
Изменеия 24h: 0.00 %, 7d: 0.00 %
Cегодня L: $0 - H: $0
Капитализация $0 Rank 99999
Цена в час новости $ 0.0014615 (-100%)

bridge security hacks memory tech should new

bridge security → Результатов: 43


Blockchain security company Quantstamp joins Korean accelerator backed by Shinhan Financial 

CryptoNinjas » Blockchain security company Quantstamp joins Korean accelerator backed by Shinhan Financial  Quantstamp, a blockchain security-infrastructure company, announced it has been inducted as a member of Shinhan Square Bridge: Incheon (located in Incheon Startup Park) backed by Shinhan Financial Group, a leader in the Korean financial services sector.

2021-3-11 02:22


After A Failed Roll Out in May, Bitcoin-to-Ethereum Bridge, tBTC Relaunches; Passing 3 Security Audits

According to the launch statement, tBTC aims to increase participation and growth in the top cryptocurrency ecosystem by providing a bridge to DeFi. Contrary to other ETH-based BTC products such as BitGo’s wBTC, tBTC will provide a platform to exchange tBTC to BTC and vice versa with “no intermediary needed to sign off.

2020-9-24 19:52


Фото:

Taiwanese Startup Unveils Solution to Bridge IoT and DLT

International Trust Machines Corporation (ITM), a Taiwan-based startup that claims to be focused on empowering Internet-of-Things (IoT) devices with blockchain capabilities and make it easier for businesses to adopt distributed ledger technology (DLT), has joined forces with Microsoft and Qualcomm to launch a solution aimed at boosting the performance and security of chipsets certified forRead MoreRead More.

2020-1-6 16:00


Newly launched Bitcoin/XRP/Ethereum/Litecoin/Bitcoin Cash-trading exchange already has serious security vulnerabilities

DX.Exchange, a crypto-based asset trading platform has lately been making positive noise in the news cycle due to its January 7th launch. The exchange has been marketed as the platform that will bridge the gap between cryptocurrencies and real-world stocks, as investors can purchase tokenized versions of Apple, Facebook and Apple stocks, as well as […] The post Newly launched Bitcoin/XRP/Ethereum/Litecoin/Bitcoin Cash-trading exchange already has serious security vulnerabilities appeared first on CaptainAltcoin.

2019-1-11 08:21


Фото:

Natmin Building a Bridge Between Escrow and Blockchain to Double Security and Accountability

Gone are the days when we would fumble around in our pockets for a wad of cash to pay the seller with. The recent years have been all about online transactions and money transfers. While the pros are many, this facility carries in its wake a host of cons, one of the major ones being […] The post Natmin Building a Bridge Between Escrow and Blockchain to Double Security and Accountability appeared first on ZyCrypto.

2018-10-15 23:53


Cyber criminals are now stealing directly from cryptocurrency users

Hackers are now targeting cryptocurrency investors directly, after the exchanges increased their security measures, as they see the users as softer targets. HypnoArt / Pixabay See below fro a comment from Ilia Kolochenko, CEO and founder of web security company High-Tech Bridge on this topic: “There is nothing substantially new or unexpected in the skyrocketing […]

2018-7-14 03:12