Who Secures Crosschain Messages?
Impossible d'ajouter des articles
Désolé, nous ne sommes pas en mesure d'ajouter l'article car votre panier est déjà plein.
Veuillez réessayer plus tard
Veuillez réessayer plus tard
Échec de l’élimination de la liste d'envies.
Veuillez réessayer plus tard
Impossible de suivre le podcast
Impossible de ne plus suivre le podcast
-
Lu par :
-
De :
À propos de ce contenu audio
In this episode of Composable, Alysia and Ellie explore the security of crosschain messages. They examine notable bridge attacks, analyze what makes crosschain messages vulnerable, and discuss various security approaches, including multisigs and Trusted Execution Environments (TEEs). The episode breaks down the technical aspects of securing crosschain messages while considering the trade-offs between speed and usability.
Key Topics Covered:- Notable bridge attacks like Ronin, Wormhole, and Orbit
- The anatomy of crosschain messages
- Security vulnerabilities in bridge systems
- Multisig security models and their limitations
- Trusted Execution Environments (TEEs) and their role in securing crosschain messages
- Trust assumptions in various other security approaches
Composable is a bi-weekly podcast exploring crypto's building blocks. Hosted by Alysia and Ellie, and brought to you by Espresso.
Find us on X:
Composable — @composablepod
Alysia — @alysiatech
Ellie — @ellierdavidson
Vous êtes membre Amazon Prime ?
Bénéficiez automatiquement de 2 livres audio offerts.Bonne écoute !
Aucun commentaire pour le moment