{"id":5639,"date":"2025-07-24T09:23:59","date_gmt":"2025-07-24T09:23:59","guid":{"rendered":"https:\/\/bitunikey.com\/news\/bridges-are-a-road-to-nowhere-for-blockchain-communications-opinion\/"},"modified":"2025-07-24T09:24:09","modified_gmt":"2025-07-24T09:24:09","slug":"bridges-are-a-road-to-nowhere-for-blockchain-communications-opinion","status":"publish","type":"post","link":"https:\/\/bitunikey.com\/news\/bridges-are-a-road-to-nowhere-for-blockchain-communications-opinion\/","title":{"rendered":"Bridges are a road to nowhere for blockchain communications | Opinion"},"content":{"rendered":"<div class=\"post-detail__content blocks\">\n<div class=\"cn-block-disclaimer\">\n<div class=\"cn-block-disclaimer__icon\">\n            <svg class=\"icon icon-info\" aria-hidden=\"true\"><use xlink:href=\"#icon-info\"><\/use> <\/svg>        <\/div>\n<p class=\"cn-block-disclaimer__content\">\n            Disclosure: The views and opinions expressed here belong solely to the author and do not represent the views and opinions of crypto.news\u2019 editorial.        <\/p>\n<\/p><\/div>\n<p><!-- .cn-block-disclaimer --><\/p>\n<p>Everybody knows blockchain bridges are broken. They\u2019re widely recognized as one of the major risks of dealing in DeFi, exemplified by the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.chainalysis.com\/blog\/qubit-hack-north-korea\/\" target=\"_blank\" rel=\"nofollow\">Qubit<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bbc.com\/news\/technology-60933174\" target=\"_blank\" rel=\"nofollow\">Ronin<\/a>, and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.theverge.com\/2022\/2\/3\/22916111\/wormhole-hack-github-error-325-million-theft-ethereum-solana\" target=\"_blank\" rel=\"nofollow\">Wormhole<\/a> exploits that stole hundreds of millions of dollars of investors\u2019 money.\u00a0<\/p>\n<div id=\"cn-block-summary-block_10cd7414b3edd3a1307752bc1bd76d77\" class=\"cn-block-summary\">\n<div class=\"cn-block-summary__nav tabs\">\n        <span class=\"tabs__item is-selected\">Summary<\/span>\n    <\/div>\n<div class=\"cn-block-summary__content\">\n<ul class=\"wp-block-list\">\n<li>Blockchain bridges are inherently insecure, riddled with vulnerabilities that have led to massive exploits, exposing critical flaws in cross-chain infrastructure.<\/li>\n<li>Despite the risks, bridges remain central to web3 due to the fragmented nature of blockchain ecosystems and the growing need for interoperability across networks.<\/li>\n<li>Chain Signatures offer a breakthrough alternative, enabling secure, decentralized cross-chain communication without relying on wrapped assets or centralized validators.<\/li>\n<li>Powered by MPC and Trusted Execution Environments, Chain Signatures eliminate single points of failure by distributing trust and securing private keys in isolated environments.<\/li>\n<li>This new model abstracts away the complexity of blockchain, paving the way for seamless multichain applications and a safer, smarter foundation for the future of interoperability.<\/li>\n<\/ul><\/div>\n<\/div>\n<p><!-- .cn-block-summary --><\/p>\n<p>They suffer from multiple points of failure, yet they\u2019re still widely used, making a mockery of anyone who claims blockchain transactions are somehow more \u201csecure\u201d than traditional finance.\u00a0<\/p>\n<p>Nonetheless, blockchain bridges have become a vital part of the DeFi and web3 ecosystem because it has morphed into a mishmash of independent networks. Bitcoin (BTC) has immense value and security, Ethereum (ETH) is home to the biggest selection of dApps, and Solana (SOL) is prized for its super-fast transactions. Due to this, there\u2019s a need to be able to move assets from one chain to another. DeFi users who restrict themselves to a single network miss out on major opportunities, which is why interoperability is viewed as essential, even if it\u2019s highly risky.<\/p>\n<p>But what makes blockchain bridges so vulnerable? Mostly, it\u2019s because they\u2019re made up of multiple components, including validators, oracles, and custodians, which expose users to numerous attack vectors. These risks have been illustrated numerous times in the shape of smart contract hacks and validator takeovers. Moreover, even if the bridge itself is secure, hackers can still steal users\u2019 funds through tricks like Border Gateway Protocol hijacking or exploiting the underlying network. With so many moving parts, it seems unlikely that bridges will ever be made secure.\u00a0<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<h2 class=\"wp-block-heading\">So, how can we remedy this?<\/h2>\n<p>We need to move away from this idea that bridges are somehow the best solution, and instead see blockchain interoperability for what it really is. It\u2019s essentially about blockchain communication, or getting these networks to talk to one another, and there\u2019s no hard-coded rule that we have to use a bridge.\u00a0<\/p>\n<p>A more promising system involves <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/docs.near.org\/chain-abstraction\/chain-signatures\" target=\"_blank\" rel=\"nofollow\">Chain Signatures<\/a>, which were developed by HOT Labs and NEAR Protocol\u2019s (NEAR) teams as a way for accounts to sign transactions on multiple blockchains. They utilize a decentralized multi-party computation network or MPC secured by staking to facilitate highly resilient cross-network communication.\u00a0<\/p>\n<p>Within an MPC network, multiple nodes collaborate to perform complex calculations while retaining full privacy over their computational outputs. In Chain Signatures, these MPCs are combined with NEAR accounts, which are unique from those on other blockchains because of their ability to control an unlimited number of sub-accounts that can act in the same way as smart contracts. These sub-accounts can therefore be used to manage programmable MPC calls and request individual nodes within these networks to sign transactions on third-party blockchains.\u00a0<\/p>\n<p>Because each of the MPC nodes works independently of the others and retains full privacy, Chain Signatures can distribute trust across multiple actors, ensuring that none of them has access to the full transaction data. When a NEAR account requests the MPC network to sign a transaction for another blockchain, it will utilize a key that\u2019s shared by each of the MPC nodes to generate a cryptographic signature of that transaction, without exposing any of the details.\u00a0\u00a0<\/p>\n<p>The only thing left to do is to safeguard this cryptographic key, and this can be done using something called \u201cTrusted Execution Environments.\u201d These are secure areas within computer processors that protect code and data from unauthorized access. They do this by isolating it from the main operating system and other processes, ensuring \u201cconfidential\u201d transaction processing. We can use TEEs to safeguard the master keys for Chain Signature transactions. When a NEAR account requests the MPC network to sign a transaction, the data for that request goes into the TEE, which then spits out the digital signature that verifies the transaction. But the cryptographic key never leaves this safe and secure environment. As a result, this private key is never exposed, eliminating any possibility of unauthorized access.<\/p>\n<h2 class=\"wp-block-heading\">Chain bridges change the game<\/h2>\n<p>We can see the implications of Chain Signatures and how they drastically ease cross-chain transactions. The level of abstraction they achieve makes the actual blockchain network more or less irrelevant to the end user in a number of dApps. For instance, Satoshi Protocol is a Bitcoin L2 rollup network that relies on Chain Signatures to power native BTC smart contracts to facilitate automated lending, with repayments, interest accrual, and rewards distribution. For the user, they won\u2019t even notice they\u2019re constantly sending and receiving funds from a second network.\u00a0<\/p>\n<p>There are more examples in the broader DeFi industry, such as RHEA Finance, a cross-chain yield farming and crypto trading protocol that\u2019s built atop of the Chain Abstraction stack to initiate seamless transactions across DeFi ecosystems.\u00a0<\/p>\n<p>Besides DeFi, gas fee payments can also be simplified dramatically with Chain Signatures. With HOT Gas Refuel, users can pay gas fees on the BNB Chain using both NEAR and Tether (USDT) tokens, eliminating the hassle of acquiring BNB tokens.\u00a0<\/p>\n<p>Chain Signatures can also be implemented to simplify cross-chain staking. Allstake has developed a meshed restaking protocol that enables restaking across every blockchain by decoupling consensus and execution. Buying NFTs or non-fungible tokens is also dramatically simplified with Chain Signatures. The multichain, chain-abstracted NFT marketplace Mint has already demonstrated this by enabling NEAR wallets to buy and hold TON-based NFTs and Gifts, and more chains to come. All on top of the same Chain Abstraction engine.<\/p>\n<p>It\u2019s clear Chain Signatures are robust and flexible enough that they can become the foundational infrastructure that abstracts away the entire network for end users, including developers, giving rise to a seamless multichain future, where every single dApp is \u201cchain-abstracted\u201d by default. They completely eliminate the need for wrapped assets, trusted relayers, and intimate knowledge of how blockchains function, giving developers a unified API for building dApps that can interact with any network. It\u2019s the simplest solution yet to blockchain interoperability.<\/p>\n<h2 class=\"wp-block-heading\">It\u2019s time to move beyond bridges<\/h2>\n<p>The web3 industry remains fixated on blockchain bridges as the ultimate enabler of cross-chain interoperability, but no one has yet been able to stamp out the numerous critical flaws in these architectures.\u00a0<\/p>\n<p>These days, there\u2019s a lot of focus on so-called \u201ctrustless\u201d bridges that eliminate the custodial risk factor by solidifying trust in code rather than humans. This means users don\u2019t need to trust any third-party systems, but it doesn\u2019t solve the risk of exploits in the underlying code. The industry needs to wake up to the fact that, so long as it relies on code to secure transactions, there will always be some level of risk because even the most solid and heavily audited implementations can be flawed.<\/p>\n<p>That\u2019s why Chain Signatures represent more than just a technical upgrade \u2014 they\u2019re a foundational shift in how web3 thinks about interoperability. We\u2019ve already reached the limits of what bridges can safely do. Chain Signatures move past this idea to fundamentally reimagine cross-chain access, not as an asset transfer, but as secure remote execution. And with this change in mindset, we can unlock a future where identity and intent move across chains, as opposed to the underlying assets.\u00a0\u00a0<\/p>\n<p>With Chain Signatures, we no longer need to trust humans or code. Instead, we can distribute trust across multiple nodes and protect this with TEE-based key management, replacing single points of failure with an ironclad framework that will only break down if the whole system collapses. And there\u2019s no way that\u2019s ever going to happen.\u00a0<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<div class=\"cn-block-author author-card\">\n<div class=\"author-card__photo\">\n<picture decoding=\"async\" class=\"author-card__image\"><source type=\"image\/webp\" ><\/source><\/p>\n<\/picture><\/div>\n<p><!-- .author-card__photo --><\/p>\n<div class=\"author-card__content\">\n<div class=\"author-card__name\">\n                Andrey Zhevlakov            <\/div>\n<p><!-- .author-card__name --><\/p>\n<div class=\"author-card__bio\">\n<p><b>Andrey Zhevlakov<\/b><span style=\"font-weight: 400;\"> is the co\u2011founder and chief technology officer at HOT\u202fLabs, a pioneering blockchain startup behind HOT Wallet and the HOT Omni chain\u2011abstraction platform. A graduate of ITMO University, Andrey began his journey in web3 by co\u2011creating one of the top mobile wallets for NEAR. Under his technical leadership, HOT Wallet reached over 30\u202fmillion users, and HOT Omni recently surpassed one million active users, facilitating seamless, decentralized management of multichain assets via MPC and TEE technologies. With deep expertise in decentralized systems and multi\u2011chain protocols, Andrey is the driving force behind HOT Labs\u2019 vision of interoperability without bridges\u2014a future where secure, intent\u2011based cross\u2011chain execution replaces risky wrapped assets and relayers.<\/span><\/p>\n<\/p><\/div>\n<p><!-- .author-card__bio --><\/p>\n<div class=\"author-card__social\">\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/azbang\/\" class=\"community-link\" target=\"_blank\" rel=\"nofollow\" aria-label=\"LinkedIn\"><\/p>\n<p>    <svg class=\"community-link__icon\" aria-hidden=\"true\">\n        <use xlink:href=\"#icon-social-linkedin\"><\/use>\n    <\/svg><\/p>\n<p><\/a><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/azbang_\" class=\"community-link\" target=\"_blank\" rel=\"nofollow\" aria-label=\"Twitter\"><\/p>\n<p>    <svg class=\"community-link__icon\" aria-hidden=\"true\">\n        <use xlink:href=\"#icon-social-twitter\"><\/use>\n    <\/svg><\/p>\n<p><\/a><\/p><\/div>\n<p><!-- .author-card__social --><\/p><\/div>\n<p><!-- .author-card__content --><\/p><\/div>\n<p><!-- author-card --><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Disclosure: The views and opinions expressed here belong solely to the author and do not represent the views and opinions of crypto.news\u2019 editorial. Everybody knows blockchain bridges are broken. They\u2019re&hellip;<\/p>\n","protected":false},"author":1,"featured_media":5640,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency"],"_links":{"self":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/5639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/comments?post=5639"}],"version-history":[{"count":1,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/5639\/revisions"}],"predecessor-version":[{"id":5641,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/5639\/revisions\/5641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media\/5640"}],"wp:attachment":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media?parent=5639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/categories?post=5639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/tags?post=5639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}