Cross chain security Part 1 — A framework for understanding cross-chain systems

Designing cross chain apps was so much easier before

Breaking cross-chain protocols into layers

Base layer

Auth layer

Transport layer

Interface layer

Cross-chain security principles

Cross-chain read/write

Consensus overlap

Some quirks of cross-chain security

Obscured economic risk

Cross-chain slashing




Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

SSA.GOV To Require Stronger Authentication

The Social Security Administration's message to Americans regarding the new login changes coming in July 2017.

Coinbase now supports Solana

Coinbase now supports Solana

ITSM in 2019: are you ready for the Internet of Things (IoT)?

BlackHat 2017 News You May Have Missed

How Are Cyber Threats Targeting Power Grids?

Cookware Giant Meyer Attacked

8 Security Threats Everyone May Fall Victim To — Explained

Explaining the Litentry Parachain Auction (III) — Use Cases and dApp

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


More from Medium

Active Liquidity Bots Allow LPing to Keep Pace with the Cross-Chain Expansion of DeFi

Crypto Regulation News: EU regulator calls for public input on DLT, US Congress to examine the…

Cross chain security Part 2 — Safety, Liveness and Economic Security