If your application is a roll up and its kind of like tied to the same data af alability lar, you have definite definition better bridging than if this application was a chain and not a rolup. So my personal feeling is like people fil chose systems which offer some kind of shared security. The celestial plants provided polcadot provides it es costmos is trying to provide it with interchanged securityye. Do you think that we will find one bridge technique to win them all eventually? Or do you think maybe they just sort of cluster around some like winning strategies definitely cluster around.
In this week’s episode, Anna chats with Vaibhav Chellani, a bridge builder and the co-founder of Socket. They explore what makes up the components of a bridge, the types of bridges, and then look at their framework for analysing the security trade-offs of different bridge architectures. This is an important topic, since at present, there are more and more bridges coming online to connect all the different chains together. And with these come a number of new bugs, hacks and exploits. This episode gives us an overview on how to think about bridges.
Here are some links for this episode:
Check out ZK Whiteboard Sessions, produced by ZK Hack & powered by Polygon, a weekly educational series of interviews with ZK experts on the most important concepts and building blocks in ZK.
Also, zkSummit is happening in Berlin on September 15th! Apply to attend here.
If you like what we do: