Feb 15, 2024

deBridge CEO Alex Smirnov weighs in on the significance of maintaining security in the cross-chain space as major hacks and exploits have been seen in bridging protocols.

Video transcript

The protocol is presented by the Stellar Community Fund accelerate your web free project with stellar Funding security has been very challenging aspect of the cross chain space, right? And we've seen many bugs and like the biggest exploits were happening with the bridging protocols. And I I think that the main reason is that like historically, all most of the bridges have been designed in a kind of flawed way, right? Because all the bridges are leveraging liquidity pools which are used for settlement. And this liquidity pools are sort of honey pots for all the hackers, right? And in the bridge, we've taken a very different approach. We pioneered zero T VA model which is based on cross chain intents. So instead of using liquidity pools, we leverage the network of private market makers and mev searchers who execute or file fill transactions for users. So basically any cross chain transaction or any bridging transaction is just limit order or intent that user creates.

Learn more about Consensus 2024, CoinDesk’s longest-running and most influential event that brings together all sides of crypto, blockchain and Web3. Head to coindesk.consensus.com to register and buy your pass now.