Konda: We essentially cannogh describe it as like bridges that verify the validity of a state transition. And wed to that, in a decreasing order, we start with the most effective way to move assets or data across chans. So let me kennet describe how rollops are an example of this. Konda: These are systems that allow acertain data movements, but they only validate consensus,. ok? This is all theoretical. I don't think it's possible, but you would actually be rike checking all transactions. You wouldn't just be verifying two thirds of the validators onetherium and vice versai. It's like a very lazy way of doing it
In this week’s episode, Anna chats with Vaibhav Chellani, a bridge builder and the co-founder of Socket. They explore what makes up the components of a bridge, the types of bridges, and then look at their framework for analysing the security trade-offs of different bridge architectures. This is an important topic, since at present, there are more and more bridges coming online to connect all the different chains together. And with these come a number of new bugs, hacks and exploits. This episode gives us an overview on how to think about bridges.
Here are some links for this episode:
Check out ZK Whiteboard Sessions, produced by ZK Hack & powered by Polygon, a weekly educational series of interviews with ZK experts on the most important concepts and building blocks in ZK.
Also, zkSummit is happening in Berlin on September 15th! Apply to attend here.
If you like what we do: