November 3, 2023

What are Crypto Bridges?

dYdX

The cryptocurrency ecosystem is ever-evolving, and staying ahead of the latest is a solid prerequisite for anyone looking to be a part of the crypto community. Among the many emerging technologies, bridges play a pivotal role (and get most of the bad press). 

When news outlets report on crypto cross-chain bridges, seeing scary phrases like “record-breaking hack” or “exploit” in the headlines is extremely common. In fact, crypto analytics firm Chainalysis estimates hackers stole $2 billion from crypto bridges in 2022, making them one of the weakest points in Web3. Reports also suggest bridge hacks are among the most common risks traders face when using decentralized finance (DeFi) applications. 

But despite the issues and security concerns surrounding cross-chain bridges, some developers believe these protocols are essential for the crypto economy’s long-term success. 

So what are crypto bridges, what makes them both a promising technology and a huge vulnerability, and how do crypto traders safely use cross-chain bridges when exploring the decentralized web? Let’s find out. 

What are Crypto Bridges?

A crypto bridge is a software protocol or service designed to help traders send one crypto asset to another cryptocurrency’s decentralized network (aka blockchain). When people transfer their cryptocurrency to a bridge, they transform their original currency into a synthetic copy (aka a wrapped token) on a different blockchain. The new cryptocurrency typically has the same market price as the initial digital asset, but it’s wrapped in the coding standard for another cryptocurrency’s ecosystem. 

For example, a crypto trader interested in using Ethereum’s ether coin (ETH) on the Avalanche blockchain sends ETH to the Avalanche Bridge to receive an equivalent amount of Avalanche-accessible wrapped ETH (wETH). Since each cryptocurrency blockchain uses different programming languages and algorithms, sending digital assets directly between separate networks like Ethereum and Avalanche is impossible, indicating the need for cross-chain bridges. 

How Do Crypto Blockchain Bridges Work? 

Crypto bridges create (aka mint) or delete (aka burn) cryptocurrencies depending on the service a trader requests. If a trader wants a wrapped token to use on another blockchain, the bridge protocol mints a synthetic token equivalent to the amount of cryptocurrency the trader deposited. Conversely, when traders want to reconvert their wrapped tokens into their initial deposit, the bridge typically burns them and sends the original cryptocurrency to the trader’s wallet

Circling back to the ETH-Avalanche example––the Avalanche Bridge mints wETH when it receives ETH from traders, but it burns wETH when traders request an ETH withdrawal. 

Note: While bridges accept both crypto coins and tokens, they only mint wrapped tokens. Don’t be confused by these terms’ apparent synonymity––though they might seem similar, they are completely different. While coins are native to a blockchain’s internal processes (e.g., Bitcoin on the Bitcoin blockchain), tokens are cryptocurrencies built on top of a coin’s blockchain. Because tokens need to conform to an underlying blockchain’s code, creating synthetic token copies of coins on competing networks, such as wETH on the Avalanche blockchain, is possible. 

Further, a significant distinction when comparing cross-chain bridge providers is whether they’re custodial or non-custodial. Similar to the differences between custodial and non-custodial crypto wallets, the feature separating these bridges is whether they have a centralized or decentralized infrastructure. Custodial (or centralized) bridges have a single entity, such as an exchange, to handle transfers between crypto assets. In contrast, non-custodial (or decentralized) bridges use blockchain-based programs called smart contracts to automate the transfer process.

Why is Bridging Crypto so Important? 

Without technologies like crypto bridges, different blockchains can’t communicate with each other. In cryptocurrency circles, this issue is often described as the “interoperability problem” because blockchains only “operate” within their rigid, predefined coding standards. Just as apps designed for iOS devices can’t work on Android phones, transferring value between blockchains with unique coding standards is impossible. 

Bridges improve blockchain interoperability by letting traders seamlessly move digital assets throughout the crypto ecosystem. Rather than relying on the coins and tokens available on one chain, crypto bridges allow traders to send any digital asset to whatever decentralized application (dApp) they want to use, thus increasing the usability, flexibility, and accessibility of cryptocurrencies. Therefore, the primary benefit of bridging is to build connections—and inspire collaboration—in the emerging decentralized web. 

What are the Risks of Using Crypto Bridges? 

While cross-chain bridges aim to promote safe inter-blockchain transfers, they are some of the most vulnerable protocols in Web3. The reasons crypto bridges experience severe and frequent attacks are twofold: massive in-house crypto volume and coding glitches. 

Like many other innovations in cryptocurrency, bridging technology is highly experimental and prone to unforeseen errors. However, the more significant threat specific to bridges is that they hold a comprehensive cryptocurrency inventory. Since traders send their crypto coins to a bridge whenever they want to mint new tokens, bridges have a ton of digital funds in their reserves. The large stockpiles of cryptocurrency make bridges prime targets for some of the world’s most sophisticated and notorious hackers, including North Korea’s Lazarus Group. 

In the Lazarus Group fiasco, hackers broke into the Ronin Bridge in 2021 and stole more than $500 million from crypto traders. Developers behind the popular Pokémon-style game Axie Infinity created the Ronin side-chain in 2021 on top of Ethereum to provide users with a faster and lower-fee gaming experience. To transfer assets between Axie Infinity on Ronin and the Ethereum mainnet, traders sent their crypto through the Ronin Bridge. The Lazarus Group hackers discovered sensitive passcodes on the Ronin blockchain’s primary wallet, giving them the authority to transfer funds from the Ronin Bridge to their crypto wallets. 

Although the Ronin Bridge hack is the most substantial single attack on a cross-chain bridge, other bridges, such as Wormhole and the Harmony Bridge, cost traders hundreds of millions of dollars. 

So no matter how a cross-chain bridge appears, remember that these protocols are still highly experimental and vulnerable. Although developers are constantly improving inter-blockchain communication, there are inherent risks when sending crypto to a cross-chain bridge. 

What are Some Examples of Cross-Chain Bridges? 

Finding a crypto bridge to use depends on what cryptocurrency you want to send and where you want to use it. However, working with crypto bridges through official blockchain projects is the most common move. 

For instance, if you want to use Ethereum-based tokens in the Polygon Network (MATIC), the Polygon Bridge is an option. Or, if you’re more interested in transferring Ethereum tokens to the Arbitrum (ARB) blockchain, you need to use the Arbitrum Bridge. Other popular blockchains with proprietary bridges include Avalanche Bridge, Optimism Bridge, and Cronos Bridge. 

On the contrary, the downside of using the above bridges is that they solely focus on transferring digital assets to their target blockchain. If you want to send crypto to other ecosystems, you need bridges with multi-chain support such as Synapse, Portal, or Multichain. One way to research bridges in this multi-chain category is to visit crypto analytics site DeFi Llama’s “Bridges” tab and review the largest crypto bridges online. Thoroughly read about each bridge’s history, transparency, and funding before deciding which service best suits your needs and preferences. 

dYdX Chain: Bridging the Gap in Crypto Derivatives Trading 

To offer eligible traders a seamless and secure decentralized derivatives experience, dYdX has shipped open source code for dYdX Chain in the Cosmos ecosystem. With its revolutionary Inter-Blockchain Communication Protocol (IBC), Cosmos provides a way to bridge diverse networks without sacrificing blockchain sovereignty, decentralization, and network security. To learn more about dYdX’s latest updates and features, like the dYdX Chain, check out our official blog

Also, visit dYdX Academy for more educational articles on the latest innovations in blockchain technology, and eligible traders can start trading on dYdX today.

Legitimacy and Disclaimer

Crypto-assets can be highly volatile and trading crypto-assets involves risk of loss, particularly when using leverage. Investment into crypto-assets may not be regulated and may not be adequate for retail investors. Do your own research and due diligence before engaging in any activity involving crypto-assets.

dYdX is a decentralised, disintermediated and permissionless protocol, and is not available in the U.S. or to U.S. persons as well as in other restricted jurisdictions. The dYdX Foundation does not operate or participate in the operation of any component of the dYdX Chain’s infrastructure.

The dYdX Foundation’s purpose is to support the current implementation and any future implementations of the dYdX protocol and to foster community-driven growth in the dYdX ecosystem.

The dYdX Chain software is open-source software to be used or implemented by any party in accordance with the applicable license. At no time should the dYdX Chain and/or its software or related components be deemed to be a product or service provided or made available in any way by the dYdX Foundation. Interactions with the dYdX Chain software or any implementation thereof are permissionless and disintermediated, subject to the terms of the applicable licenses and code. Users who interact with the dYdX Chain software (or any implementations thereof) will not be interacting with the dYdX Foundation in any way whatsoever. The dYdX Foundation does not make any representations, warranties or covenants in connection with the dYdX Chain software (or any implementations and/or components thereof), including (without limitation) with regard to their technical properties or performance, as well as their actual or potential usefulness or suitability for any particular purpose, and users agree to rely on the dYdX Chain software (or any implementations and/or components thereof) “AS IS, WHERE IS”.

Nothing in this post should be used or considered as legal, financial, tax, or any other advice, nor as an instruction or invitation to act by anyone.  Users should conduct their own research and due diligence before making any decisions. The dYdX Foundation may alter or update any information in this post in the future at its sole discretion and assumes no obligation to publicly disclose any such change. This post is solely based on the information available to the dYdX Foundation at the time it was published and should only be read and taken into consideration at the time it was published and on the basis of the circumstances that surrounded it. The dYdX Foundation makes no guarantees of future performance and is under no obligation to undertake any of the activities contemplated herein.

dYdX is a decentralised, disintermediated and permissionless protocol, and is not available in the U.S. or to U.S. persons as well as in other restricted jurisdictions. The dYdX Foundation does not operate or participate in the operation of any component of the dYdX Chain's infrastructure.

Nothing in this website should be used or considered as legal, financial, tax, or any other advice, nor as an instruction or invitation to act in any way by anyone. You should perform your own research and due diligence before engaging in any activity involving crypto-assets due to high volatility and risks of loss.

Depositing into the MegaVault carries risks. Do your own research and make sure to understand the risks before depositing funds. MegaVault returns are not guaranteed and may fluctuate over time depending on multiple factors. MegaVault returns may be negative and you may lose your entire investment.

The dYdX Foundation does not operate or has control over the MegaVault and has not been involved in the development, deployment and operation of  any component of the dYdX Unlimited software (including the MegaVault).

Crypto-assets can be highly volatile and trading crypto-assets involves risk of loss, particularly when using leverage. Investment into crypto-assets may not be regulated and may not be adequate for retail investors. Do your own research and due diligence before engaging in any activity involving crypto-assets.

Leaving site