1 hours 3 minutes 21 seconds
🇬🇧 English
Speaker 1
00:01
Alrighty, I think we should probably go ahead and get started. I think there's definitely going to be people continuing to jump in as we get going, but I've dropped this link into a bunch of different places already.
Speaker 2
00:17
Previously on burning bridges, you can see the in the pin tweet we have last week's episode. So if you're listening to this in the future, you should go check that out. Last week, we talked about what it means to be trusted and safe and decentralizing crypto.
Speaker 2
00:33
What happens when builders don't talk about security first mindset and build with that. And kind of how to think about trade offs when you go 1 direction or another when it comes to the trust, safety and decentralization triangle. This week we're talking about Layer 0, and first we should talk about the news from Bridging since we kind of met last. There's a lot that's been going on.
Speaker 3
00:55
Yeah, what are you talking about? Anything interesting happen lately?
Speaker 2
00:59
Well, You know, I think maybe the first thing we should talk about is maybe any swap because that happened first and then Obviously the big thing that happened yesterday Hold on I'm grabbing a tweet for any swap but The deal there is that there was a vulnerability in their token contracts that required users to revoke their authorization.
Speaker 1
01:23
Yeah.
Speaker 4
01:26
We're still at the stage where the kinds of attacks that we're seeing on these protocols are attacks related to contract security risk and not attacks related to like their actual economic models. So like, while, you know, while this is obviously as competitors to these projects, it's obviously like a great time for us to be able to like, you know, fling shit and say, oh, well, these models don't work. The reality is that that could happen anywhere.
Speaker 4
01:55
It could happen in a roll of contract, it could happen in the ETH2 deposit contract, it could happen just about wherever anyone has written any code. And that's part of like why building in this space is incredibly difficult and also part of why in the past it took a lot longer for protocols to really like get to the point where they had such a high amount of value under their control is because people were generally a little bit more scared to ape, though that's changed a little bit now as more people have come into the space. And the numbers overall have gotten higher, So the perceived risk has gotten lower.
Speaker 5
02:38
Yeah, and that same thing applies to the wormhole exploit. I mean, in so far as I understand how the exploit worked, there was basically just this verification step that could be bypassed just due to a bug. So whatever you think about different trust models of bridges and of chains and trust minimization, that really doesn't have to do with how this exploit happens.
Speaker 5
02:55
So it's not really the time to gloat about the importance of trustless bridges and things like that. There's been a lot of takes in that direction, and a lot of takes about, oh, this is why we shouldn't do cross-chain bridges, this is why we should only live on ETH, and it's, yeah, that just doesn't really apply here. Even more ETH or L2 native things could, are vulnerable to this type of bug. Because as you say, it's just sort of an implementation bug.
Speaker 5
03:22
And this, these, these, you know, we're still maturing on that level. So it's time to, it's a time to be humble and recognize that. And yeah, I mean, in, in, in other situations where it is like the trust model that goes wrong, you know, like, I don't know, Quadriga, maybe that's the appropriate time to sort of talk about the importance of fresh minimization. But yeah, not now, not today.
Speaker 3
03:45
I gotta say, 1 of my favorite things to come out of the Quadriga Wonderland all that all the brouhaha. There is the the funds are with Sifu memes I've been really enjoying that But yeah, I think what we're looking at is basically Maslow's hierarchy of security, right? So the underlying, I think James has a good way of describing it, the root of trust doesn't matter if the application layer is busted.
Speaker 3
04:13
And here, the issue was with smart contracts again. So if you're dealing with issues at the application layer, people need to I think, I think a lot of this the issue here is with solidity. It's quite hard to write good applications where you can reason about what's going on and I think a lot of that needs to get solved whether it's at the cross-chain use cases or just even on 1 chain. So Daniel, I think you referenced some people were basically like Vitalik is correct, I'm going to only stay on Ethereum now.
Speaker 3
04:42
But how many hacks have happened on Ethereum because of smart contract vulnerabilities? The amounts there are insane.
Speaker 4
04:50
Right. Yeah. Yeah, it's like this sort of thing isn't really like bullish for any 1 specific worldview or any 1 specific category. It's just bearish for the space overall because what this means is just in general, building this stuff is incredibly difficult.
Speaker 4
05:06
It presents massive systemic risks. And while there are a lot of, like I've personally talked to a lot of people who are building on top of some of these, some of these admittedly more trusted bridges, but their trust models really don't necessarily apply in cases like this. But most of those projects have said, oh, well, we're building on top of them because they're huge and now they're too big to fail. And I don't really think that's true.
Speaker 4
05:30
Like if you look at the average hack size, it's been growing pretty steadily over the course of the last couple of years. And it's not, it won't be long before we start seeing multi-billion dollar hacks.
Speaker 2
05:40
Yeah, I mean, the way things are going, though, it's just none of these bridge hacks that we've seen so far have actually been compromises in the security model of the trust model of the actual bridge. They've all been kind of programming errors. You know, TorChain was a bad Ethereum block transaction parsing.
Speaker 2
05:58
You know, PolyNetwork was like something with dynamic dispatch and EVM. And Wormhole was using an old outdated precompile in the Solidity side of things. So it's just like, I think the key takeaway here is that we as bridge builders and operators need to focus on kind of operational security and like excellence in, I don't know, programming. Because it turns out, not the trust model.
Speaker 3
06:26
I don't think Wormhole was the Solidity issue, it was on the Solana side. Solana, yeah,
Speaker 4
06:30
that was the Solana.
Speaker 2
06:31
Excuse me, sorry.
Speaker 3
06:33
Maybe we're jumping too deep into it, or maybe it's the right time to go into what happened.
Speaker 4
06:39
So I think 1 thing I'd like to mention, and I don't want to spend too much time on this, but this is definitely an important piece of the wormhole hack that I think people are a lot more cognizant of, which is that creating wrapped assets does present systemic risk. So while it's true that yesterday's hack was not really a result of the trust model itself, it really could have been. Like the Solana contract was really just spoofing, the hacked precompile was spoofing the validator set of the contract.
Speaker 4
07:19
And so if the contract had had a different model, trust model, it wouldn't necessarily have, may not necessarily have had the same type of effect. So this is 1 of the reasons that I like Nomad, for instance, as an alternative for wrapping assets, is just that there is an explicit 30-minute latency for doing transactions across chains. And that adds time for reacting to things like this. It is entirely possible that a contract bug could exist in Nomad.
Speaker 4
07:49
But in many cases, the surface area is lower because in many cases, the protocol, if something went wrong with the protocol and you were able to create mint funds out of nowhere, bridging them back would actually be quite difficult. It would take 30 minutes and in that time you know, it's possible that people can could notice that that actually happened and then go through Nomads existing fraud proof system to like disconnect the Nomad channel I'm
Speaker 3
08:23
a little I'm a little hesitant on this because I think it's akin to maybe CZ Asking if we can reorg a chain in order to basically like stop that Binance hack or whatever from happening, right? So the fraud or dispute window is more to prevent an updater for that basically fraud from happening at the root of trust. If there's an application level or layer vulnerability using that dispute window to prevent that seems like you're almost misusing the system.
Speaker 3
08:51
It does leave the possibility, but I think that's something that a community or governance would have to decide whether that's appropriate.
Speaker 4
08:58
Yeah. Yeah. I guess my point here is that in general, the risks of creating synthetic or wrapped assets are far, far greater. There's I guess like taking a step back, there's 2 general approaches to interop.
Speaker 4
09:17
In the first case, you are minting an asset and you're creating basically a synthetic or wrapped version of that asset on another chain. And the really quintessential example of this is WBTC. And a lot of protocols kind of fall into this category. Things like Solana, or sorry, Solana Wormhole, you know, Nomad, Multi-chain, et cetera, et cetera.
Speaker 4
09:40
And then the other version is the protocol itself holds liquidity through liquidity providers and then dispenses the actual canonical token on a given chain. And that canonical token, in theory, could be a native asset, though of course, in many cases it is also itself a wrapped asset. But we can get to that later. In the first case, the token holders in perpetuity absorb the risk of the bridge, because the bridge is kind of what controls the underlying assets that are locked against this token.
Speaker 4
10:18
And so this presents a huge problem, because if you then go on and use that asset in DeFi, you take out loans against it, you do a bunch of other types of activities, those all of those things becoming uncollateralized. And it can cause these systems to kind of implode. I'm actually incredibly surprised that that hasn't happened on Solana. It seems like there was a little bit of like a price dip but then there was a there was a market correction.
Speaker 4
10:42
I think a part of that is just that like the correct mechanisms haven't really even been built to think about this yet. And so most of the trading bots are still kind of like trading, assuming that the price is steady.
Speaker 3
10:54
I think the other thing there is it was almost a too big to fail event where Jump basically came in and said we would make people whole. And that kind of, the bank run fear goes away when a well capitalized person is willing to come backstop the entire system, right?
Speaker 2
11:11
Yeah. Yeah, you heard it here first, hashtag bridge bailouts. It's a new era.
Speaker 3
11:19
Yeah, we are the 99% occupied bridges.
Speaker 2
11:23
Occupied bridges. That might be a good segue into our topic of interest today. Unless anybody else got anything to talk about regarding Wormhole or any swap?
Speaker 4
11:37
Not really. I do think like, I mean, I guess as part of the segue, I do think like it is, I would like to reiterate that it's only a matter of time before we start seeing economic attacks on these systems. You know, like chains get 51% attacked all the time.
Speaker 4
11:51
It's a thing. But like smaller chains that have weaker security models, this happens to all the time. I think it's, you know, we're still quite early, and so on most of these validator brace bridges, there are, the validators, the node operators are all people that are super close to the team, so they're very unlikely to actually rug the system. But of course, that means that they're not really decentralized, right?
Speaker 4
12:20
Like that means effectively the team is controlling what is happening. Now the team, most, I mean, I highly doubt that any of these teams are actually gonna hack their own bridges. I think that would be crazy. But at the same time, it's not a long-term viable solution, right?
Speaker 4
12:36
It could work for like a few years to have everybody aligned and assume that they will be aligned, but it won't work in perpetuity because eventually you want these systems to be permissionless and they will get civil attack.
Speaker 5
12:47
Yes, right. And just the trust model, again, the trust model for these particular exploits wasn't directly relevant. But that isn't to say that in the big picture, trust assumptions are not relevant.
Speaker 5
12:57
Because of course they are, which maybe that itself is a nice segue into Layer
Speaker 1
13:02
0.
Speaker 2
13:03
Yeah, so I pinned their introduction tweet to the space here. Just for a little bit of background, Layer 0 is an interop protocol that came out of stealth a couple months ago. It took the bridging community by storm a little bit.
Speaker 2
13:15
They're launching here in a couple weeks. And they're just marketing heavily around solving all the problems. And maybe I'll, you know, I'd love to pass it to Arjun or Daniel to kind of talk about Layer 0 and, you know, a little bit more about like what they do and how they do it.
Speaker 5
13:31
Yeah, I mean, I guess in terms of we can start with sort of what they're, what they're claiming, as you say, you know, you, you summarize it as solving all the problems, but like more particularly, it's, you know, generalized message passing system, essentially, between any 2 chains. They're saying that it's trustless, so it doesn't involve trusted, trusted intermediaries. And also that it's sort of easier to work with.
Speaker 5
13:54
So it's low cost. It doesn't require much additional infrastructure relative to other chains. It doesn't require its own block chain for example like some of these bridges do. It also doesn't require sort of an intermediate token representation.
Speaker 5
14:08
If what you're doing, for example, is bridging tokens or doing some sort of Dexatomic swap thing, there's no sort of intermediate representation there. You just sort of get the thing you want. And there's maybe the hazier thing. There's certain other claims about permissionlessness that are kind of being made.
Speaker 5
14:25
That's a little harder to pin down, but we'll get into all of those things. So that's sort of the context of how this thing is being presented. And then, yeah, we can start getting into how it works, unless I missed anything there.
Speaker 4
14:39
Nope, I think that was a really good summary. The only other thing I would add is that part of the reason why they've gotten a lot of interest in the last couple of months is because Layer0 came out of stealth a few months ago and then raised at a billion dollar valuation per product from Sequoia. And I think that made a lot of the researchers get interested in what they were doing to try to understand what is going on.
Speaker 4
15:03
And that's how we found out about it, how we ended up reading the white paper. Or at least I ended up reading the white paper myself. And I think it's a great example of how we can explain the point at which the trust model kind of turns. You know, it's like you could have built Layer
Speaker 1
15:25
0
Speaker 4
15:25
in a trustless way, but it isn't necessarily, I mean, spoilers, it isn't currently built in a trustless way. And unfortunately, building it in a trustless way is the hard problem.
Speaker 5
15:36
Right. And as far as that problem goes, we should just say, so the white paper is still, this is linked on their home page. Have it open here. The title of the white paper is Layer 0 trustless omni-chain interoperability protocol.
Speaker 5
15:48
And yeah, the trustless came is obviously the 1 that is sort of eye-catching, what we'll probably focus on. Command-F, I don't know, they use the word trustless on 8 pages. I don't quite see how many times here, because of the way PDF search works, but I think over 20 times they use the word trustless in the white paper. So that'll probably be the crux of what we want to get to.
Speaker 5
16:07
But there's also other questions around sort of the implications of this model and yeah, what can and can't be claimed about it. So yeah, I mean, I can start by going into it and feel free to step in anyone wherever in terms of sort of what the model is. So yeah essentially we we want to have a bridging system. So we want the ability to sort of pass messages from 1 chain to another.
Speaker 5
16:33
And this problem kind of boils down to, I don't know, having 1 blockchain sort of have information about the other 1 and know about the other 1. The basic model is There's a few entities, but there's kind of 2 important ones. There's this Oracle and there's these relayers. And essentially the Oracle, so let's say that we're bridging from, let's say, Ethereum to Solana.
Speaker 5
16:56
Why not? Just a random example. So you sort of want the Solana chain to know about what's going on on Ethereum via this layer 0 bridge. You have this Oracle, which is some entity that posts Ethereum block headers directly on Solana.
Speaker 5
17:12
And then you have this other entity, which is called a relayer, which posts basically transaction data of what's going on in those blocks. And that transaction data, when posted, has to come along with a Merkle proof. And that proof kind of proves that the claim about the transaction is indeed included in the block or in the header that the block represents that the Oracle posted. So, are we so far so good?
Speaker 5
17:36
Anything else to add there or anything I missed so far?
Speaker 2
17:43
Yeah, I'll just add that, you know, it's an open system. Anybody can run an Oracle. Anybody can run 1 of these relayers.
Speaker 2
17:51
And they have like a community pool where you can kind of choose between which Oracles and relayers you might want to listen to.
Speaker 5
17:59
Yeah. So let's come back to the idea of an open system because I think that is an interesting, the framing there is important and is interesting, but maybe let's first 0 in on the trust model here. So again, the claim is that it's trustless, at least in the white paper. So, I mean, do we first want to briefly define what trustless is?
Speaker 5
18:18
I can take a stab, or if anyone else wants to, maybe that would just be useful.
Speaker 2
18:21
Yeah, that's probably a good thing to start. It's always good to start with a definition.
Speaker 5
18:24
Yeah. So I mean, I think the way I think about it, like the best formal definition I've seen, I should have this tweet ready to pin, but I can I can dig it up? But there's a paper that John Adler and Mipra Quinton Collins wrote, I can't remember the name exactly, but it has to do with a particular sidechain model. But the preamble to that paper, it's sort of leading up to the model itself, is in my mind, 1 of the best sort of formalization of a lot of these terms that I've seen.
Speaker 5
18:51
And they sort of introduced this notion of you know they like lead up to defining trustless in a formal way. If you sort of 0 it in on this idea of owned state. So there's some state that is assigned that has sort of some address, let's say, that represents the owner of that state. So we're not totally generalized, but we're, you know, kind of capturing the important things, right, especially things like bridging tokens or bridging Ethereum.
Speaker 5
19:13
There's this state and somebody owns it. And there's some system that this own state is inside. You can sort of call that system trustless if it preserves safety and liveness. This may be getting like a little too in the weeds, but like briefly, you know, liveness means that essentially up to, you know, as of some bounded time, the owner of that state will be able to move it or transfer it or sort of update it.
Speaker 5
19:39
Safety means only the owner can update it as of some bounded time, which kind of roughly translates to, you know, your funds can't be stolen and your funds can't be locked up forever. So a system that preserves those 2 things, if you have that guarantee, I would say I would say is trustless.
Speaker 4
19:54
The big note is that your funds can't be stolen even in the case of like, like so and this is the point where things get a little bit more interesting and messy, which is just like, you know, there's like trustlessness as a core concept of a property where you're building a system on top of another system. And then there's like the crypto economic security of the system itself. So like you can imagine, you know, like this is this is not this isn't currently the case and it's not going to be the case because realistically there's the amount of economic security that you would need to do it is huge.
Speaker 4
20:28
But you can imagine, for instance, a bridge that is built 1 day that is realized on like an external validator set and the security of that external validator set is far, far higher than the security of Ethereum or Bitcoin. And in that case, you know, of course, the bridge isn't being validated by the underlying chain itself. But because the security of that validator set is higher, it is effectively trustless, right? It is possible for this external validator set to censor you or steal your funds, but the amount of money it would take to do that is greater than the amount of money it would take to DOS Ethereum itself.
Speaker 4
21:07
Now the caveat here is that bridges are not like chains. In a chain, you can't actually steal funds. You can 51 percent attack and create a fork, but people can still fork away into a canonical fork. Whereas in a bridge, you can actually unlock the funds.
Speaker 4
21:22
But at a high level, I just wanted to go over the concept of crypto economics. 1 other note here, I noticed that Brian from Layer 0 is here. Brian, we're just going to step through the white paper and give our thoughts. And then we'd love to have you up here as well to chat.
Speaker 1
21:41
Cool. Sorry. Go ahead, then.
Speaker 5
21:44
Yeah. So I guess just from that, we can get to their notion of trustlessness. So basically the question now is okay we have these 2 designated parties you have an Oracle you have you have this Oracle you have this relayer and again Oracle is responsible for posting block headers then the relayer is responsible for sort of transporting the relevant data. The question then is who's to say that this will indeed be valid, right?
Speaker 5
22:06
Who's to say this is indeed, again, if it's an Ethereum to Solana layer 0 bridge, let's say, who's to say this header is indeed a valid Ethereum, represents the header of a valid Ethereum block. And then if it isn't, we could just include any old message in there and steal your money. And basically, the model that they outline is, what they point out, which is true, is that in order for something invalid to happen here, both the Oracle and the relayer would have to be well, essentially, both would have to be malicious and colluding is maybe the strongest form of the statement. And we can unpack that a bit.
Speaker 5
22:42
But that's basically what it comes down to, right? The Oracle would have to post an invalid block and then the relayer would have to sort of have some access to this data, this invalid data, right? That's not presumably not really available on Ethereum because it's invalid. And then again, they could post an arbitrary message.
Speaker 5
22:59
So that is the core assumption is that there's these 2 entities, but if they are not colluding, then we cannot have an invalid update. And then we sort of conclude that the system is trustless. So thoughts from the panel.
Speaker 4
23:15
So 1 thing that I, so we can get into the problem with that core statement. So that, by the way, that assumption is written several times in the white paper. But unfortunately, there isn't actually a good explanation of why that assumption holds true.
Speaker 4
23:29
So if you look at, if you kind of like look at section 2 in the meat of the white paper, you'll see that there is a pointer which says, okay, we'll show later why this assumption is true. And then there's you read further down and you see that it says, okay, well, we show in section 1 that because of the way that the system is constructed, there is no way to have real layer oracle collusion. And if you go to section 1, you see that it says we assume that there is no real layer oracle collusion. So that's actually something that isn't really addressed in the white paper directly, though I think in speaking and posting about this on Twitter, I think I've seen Brian post a couple of responses to it, which we can get to afterwards.
Speaker 4
24:08
Before we jump into that, though, I would like to say, there is something that I do like about the Layer 0 model. So the way that this works is it's basically like a two-phase commit. You have this proposal that is posted by an oracle, and then you have a verification step that happens on behalf of the relayer. In layer 0, this is a generic.
Speaker 4
24:27
So the verifier in this case is some external party, or it could be a set of parties, or it could be an application itself. And the way that Brian has described it on Twitter a few times is that it's really the application that kind of opts into what relayers they want to use. And I think that there's something interesting about this, because the core property, and this is something we talked about last time, that the core property that all this bridge security relies on is who is the verifier. And so in layer 0, you can actually just plug in the verifier.
Speaker 4
25:03
However, the problem is that this model doesn't actually present a new verification mechanism. So if you have the relayer be the user themselves, and the user is basically verifying the block header and then signing to approve it on their own, then it's a locally verified system. And in fact, that construction would actually be exactly like Connects. So you would have the oracles in layer 0 would be our connects routers.
Speaker 4
25:32
The user would be the relayer, and they'll be verifying their own transaction. And that would be trustless, because the only parties to that transaction are the user and the oracle. However, on the other hand, if you're using an external set of relayers, now the trust kind of relies on that external set of relayers. And it actually, it presents this interesting problem where it's like, you know, if you want to do generalized message passing, you can only make it trustless if the entity that owns the funds and data is the 1 that's verifying that those funds and data have been relayed across chains correctly.
Speaker 4
26:07
And that concept gets extremely fuzzy when the owner of the funds and data are a DAO or a smart contract, right? Because there's no real logical owner at that point. And so, you know, if you minted a token across chains using layer 0, there would be no, there would really be no way to like, prove, like you're really just relying on the security of the relay and the validator, the relay and the Oracle themselves. You're not actually proving anything on chain related to the ownership of the funds and data themselves.
Speaker 4
26:41
And I think that's a pretty important point to consider when looking at a lot of these other systems as well. So this is why I was saying it's a good example of how you can understand different verification models. Because for instance, you use another system, if you have the relayers be an external set of actors, like an external set of NPC actors, then the model looks a lot like most of the validator bridges. And on the other hand, if layer 0 had a way, and this is also the really difficult part, if layer 0 had a way to make it so that the proof that was being posted by the oracle was being verified within the virtual machine of the chains, i.e.
Speaker 4
27:23
The relayers in this case are actually the chain's own nodes or validators, then that is trust minimized. And that is actually basically what IDC is. So yeah, it's a good example of pinpointing exactly where the trust model comes from in these bridges.
Speaker 3
27:43
Yeah. So maybe a devil's advocate question, which is that, why not have the application run the verifier or the relay in this case? Because a lot of the times the application and the end user have incentive alignment. The application presumably doesn't wanna screw over its own users.
Speaker 3
28:00
So have them kind of play the relaying role. What's wrong with that?
Speaker 2
28:03
Yeah, and maybe just kind of a more general question, like where do you place the root of trust when you're building systems like this? Do you move it down the stack, which is in my opinion, a little bit more broke, and do you move it up the stack a little bit more woke?
Speaker 5
28:17
Yeah, I mean, I think if you sort of delegate relay responsibility to the application layer, I mean, you know, we could, that's fine. And we could sort of talk about, we could talk about that model and its security implications. I just don't see any way you could call that trustless because now you are quite literally assuming that this, you know, these 2 particular designated parties are not polluting.
Speaker 5
28:36
Again, I think that model might have interesting things about it, but I just can't, I can't contort the word trustless in any way that it encompasses that. The idea of where I think this gets a little trickier to even talk about is this idea that it's kind of an open system. You can sort of, you know, anyone can run Relayers, anyone can run Oracles. And I think like, the way I think about this is there's an important distinction to make here or it's important to sort of get down on what exactly we mean by permissionless, right?
Speaker 5
29:06
So a sort of kind of extreme and kind of meaningless use of the term permissionless kind of boils down to something like, okay, we have a system here and it's permissionless because anyone can sort of deploy their own copy of it and interact with that 1. And then you can just choose which 1 you interact with, which is not really what we mean by permissionless, right? I mean, by that definition, you know, by that definition, literally a permission side chain is permissionless if the code is public on GitHub, because everyone, you can just launch your own permission sidechain. So it's really when we talk about open and permissionless, you're talking about which parties have the rights to sort of interact within the system and participate in it.
Speaker 5
29:44
And so you can certainly have, I mean, I could see a situation where, you know, there's a, there's kind of this group of relayers and app can sort of pick which 1 they delegate to. They can even, you know, delegate to relayers that come to some federated consensus, that sort of thing. But what you certainly can't do, what would just sort of work this whole system is have, for example, a designated Oracle and then permissionless relayers. So if on the correct level, I say, okay, I accept any relayer, I accept any message of relayer posts so long as the Merkle proof is valid, essentially.
Speaker 5
30:24
In that version of things, for example, the whole thing just reduces the trust in the Oracle because now the Oracle can just become their own relayer and update arbitrarily. So in order to have any hope that there isn't collusion going on between Oracle and Relayers, as far as I'm concerned, I would say these parties just need to be permissioned. The Oracle as well, right? You can't have anybody posting block headers, maybe for more obvious reasons.
Speaker 5
30:46
So that's sort of how I think about in terms of like the openness and how it relates to the trust model. I don't think it's really quite right to call it permissionless, not that they do that particularly, but yeah.
Speaker 2
30:59
Yeah, maybe a more generous term is trust minimized.
Speaker 4
31:04
Yeah, well, I mean,
Speaker 1
31:06
yeah, go ahead.
Speaker 6
31:08
I would
Speaker 4
31:08
say the issue with that is just like, when you say trust minimized, the implication is that like fundamentally it is, you know, as trustless as it possibly can be. And the users are able to fairly easily understand what the root of trust is for the system overall. Whereas in this case, the root of trust kind of turns on who the relay ends up being.
Speaker 4
31:38
And I think just kind of following what you said, Daniel, there's actually a core principle here which is really important. And this is just like a principle of cryptoeconomic systems. The concepts of collusion resistance and permissionlessness do not overlap. So there is no way to have a system where you are fundamentally assuming that collusion will not occur where that system is also permissionless.
Speaker 4
32:04
This is actually 1 of the big reasons why blockchains are, and like, you know, like we've had like BFT consensus for a while. 1 of the big reasons why blockchains are actually, and like the Bitcoin blockchain was such a leap forward in terms of our understanding of distributed systems is that it made it like it wasn't possible to, you know, say with certainty that there wasn't going to be a like an arbitrary number of anonymous providers coming into the system and civil attacking it. However, what they did was they what Satoshi did was he made that explicitly really, really expensive to do. And there was a there's a materialistic there was a very material cost to doing that, which grew over time, which made the system, so it's like it's a permissionless system, but it gives the system collusion or civil resistance intrinsic to the system itself.
Speaker 4
32:57
Now, if the core thesis of Bitcoin was that it's assuming that there is not collusion amongst Bitcoin miners, then you couldn't allow anybody to be a Bitcoin miner. Those 2 things are fundamentally incompatible ideas.
Speaker 5
33:11
Yes, exactly. Exactly. Yeah.
Speaker 5
33:14
Yeah. So I was just going to add. No, yeah. Sorry.
Speaker 5
33:17
Please finish.
Speaker 6
33:18
No, no, go ahead,
Speaker 5
33:18
go ahead. I was just going to add to that, just maybe another way of sort of thinking about that, what you just said there is, or maybe just reframe what I said earlier to make it a little more clear. At least the way I would think about it is the situation where there's a network of oracles you can select from and even a network of relayers you can select from does not make the system itself permissionless.
Speaker 5
33:37
It's more like you have a series of permission systems and you can opt into which 1 you choose. Which, you know, that might be better than having 1 permission system, for example. But that's where, that's the sort of haziness there and sort of in some sense in that version of things, you know, network of oracles, network of relayers, you sort of are having just multiple bridges, which is different than a single permissionless bridge for the reasons that I think you just articulated that has to do with, yeah, the assumptions about collusion.
Speaker 2
34:11
Is it worth bringing up? Go ahead, Pranay.
Speaker 3
34:14
No, I think I was gonna say the same thing, which is that I think we should bring Primo up. Because if somebody was talking about my project or baby, I would also want a chance to respond.
Speaker 2
34:24
Yeah, exactly.
Speaker 1
34:29
You can speak now. Sorry. There you go.
Speaker 2
34:32
Hey there, Brian. Thanks for being so patient with us.
Speaker 6
34:34
Let me see, am I here now? Yeah, you're here. Okay, awesome, hey guys.
Speaker 6
34:39
Yeah, I actually think for the most part, what you've said is fairly accurate. I do think 1 thing, I was just typing up a tweet tonight, I intend to say it here now because it's easier. 1 thing I think you guys are particularly misunderstanding is that in each of these systems, you're kind of making assumptions about what the systems look like. Like imagine a world where the Tendermint validator set is actually like the acting relayer for relaying transaction groups or block headers or, you know, any piece, right?
Speaker 6
35:05
Well, when a validator set on each side is basically playing the roles of this Oracle relay, right? There is no real constraint on what those systems look like. And I think that's something where right now, I don't necessarily, or it seems like you're not sort of picturing that view where it's not necessarily just like oh 3 oracles in the sense of how we think about oracles today or a relayer and you know maybe maybe it's a single SGX server or maybe it's like this distributed network of nodes, but it can look like the whole point has been that we've left this as modular as humanly possible. In Oracle is any system that takes a block header and there really is any system that really is a transaction proof.
Speaker 6
35:43
So that could be a fraud proof system. That could be a POA system from a set of validators. It could be a complete validator set. So yeah, I'll stop there for a second.
Speaker 4
35:54
Yeah, I definitely.
Speaker 6
35:56
I was just going to say
Speaker 5
35:56
it's a
Speaker 2
35:56
good time to maybe just mention that Layer 0 leverages the chain link network, specifically around oracles. And that kind of plugs into Brian's point.
Speaker 6
36:06
It is
Speaker 4
36:06
1 of the oracles,
Speaker 3
36:07
yeah, 100%. I think Primo's main point is that these 2 actors can, in the future, be generalized to be other systems that have better trust models. But I think maybe the smooth brain way of interpreting what we've been talking about is less that this is a valid model.
Speaker 3
36:26
Like, I know people building on layer
Speaker 1
36:28
0,
Speaker 3
36:28
and it has value because it's fast and cheap and allows apps to go quickly multi-chain. I think that's a really important service and together we're building this category. But I think the main point is misrepresenting where it is now.
Speaker 3
36:41
We're using words like trustless and permissionless, makes it seem like it's the holy grail at this moment, which I think causes a disservice to the space because users may have a misunderstanding of what they're opting into.
Speaker 4
36:54
Following up on this, so this is kind of related to what I said earlier. I like the layer 0 construction in that it is a generic, right? It's not, it isn't actually a bridge.
Speaker 4
37:03
It's just a, it is base infrastructure for message passing across chains where you can plug in an arbitrary verifier. And, you know, it's actually incredibly useful. Like this is, you know, if layer 0 had existed as a concept, like a year ago when everybody was building bridges, I have no doubt that everyone would have just used it because it would have saved us all the trouble of having to like build custom infrastructure to go across chains. You know, it, each team ended up having to do this by themselves over and over again for no reason.
Speaker 4
37:34
However, I think that's actually the piece that's important here is that like the security model of the verifiers is not actually a core part of how layer 0 works at all, right? It's the idea is that like that security model can be anything. It could be a Tendermint validator set, in which case it looks like Cellar. It could be an MPC system, in which case it looks like MultiChain.
Speaker 4
37:57
It could be an optimistic system, in which case it looks like Nomad. But the issue that I have is that the way that it's represented currently says that it is a trustless bridge. And like, it's almost, it's sort of like a misnomer because it's not really a bridge, it's infrastructure for bridges. And like, the trustlessness itself, the point at which it either is or isn't trustless.
Speaker 6
38:27
Yeah, again, I don't disagree. We certainly don't represent for, think about ourselves as a bridge, right? We think about it as a generalized messaging system or infrastructure for that, right?
Speaker 6
38:37
So I think the trust properties come down to the application building on top of it and sort of how they assign that workflow and relayer. So how they assign those like the chains themselves, you know, they're atomic and state like you have to be able to pass it every system works around like passing state 1 way or another. And I think each application sort of leverages properties can represent those properties that I don't try to make claims on what people do, because I think the difference between verifying on chain B that's like you own a copper sword on chain A is just a very different undertaking than like transferring $100 million, right? These are different things that have different needs.
Speaker 6
39:16
So the way those systems work, the way they sort of manage those trust properties, we push, like the goal is to push that to application layer, to move it up the stack, to have it be as modular as possible.
Speaker 3
39:27
Can I, if I may chime in, we have Vaibhav and folks from Mover here, and I think like they've also kind of identified the same thing, which is that the application should get to decide the channel security that is acceptable for their use case? But again, Brian, I would like to ask you the bigger question around When we're hearing you speak here, it's very nuanced, and you're making valid points around where the trust model is and which part of the stack it lies in. The question, I think, from my side is the representation of it in the public sphere is trustless.
Speaker 3
39:59
That's what's concerning, because we need to educate people on what they're opting into, and it's much more nuanced than the marketing makes it look like.
Speaker 6
40:11
Sorry, it's me to talk again. Yeah, Again, I can, I guess, take that as totally valid feedback? I think the goal is it can be as trustless of a system as people design around it.
Speaker 6
40:27
Arjun's right in that it's infrastructure. So maybe the messaging is wrong there. Maybe that needs to be like moved or adjusted. But I think the goal is that, as you said, like almost any existing system, almost any trust model that exists today in bridging, you can recreate across layer 0, right?
Speaker 6
40:42
And so if you think any of those are your description of trustlessness, then the same basically can be done here. But again, it all lives at the application layer. It doesn't live at the layer 0.
Speaker 5
40:53
Yeah. And yeah, yeah. Sorry. Go ahead.
Speaker 1
40:57
No, no, go ahead. Sorry.
Speaker 5
40:58
I was going to say, you know, and like, I take your point. I take your point that, you know, these, like these entities, which, which, which have these roles that are designated to them, could be arbitrarily swapped in. So it doesn't have to be a centralized party.
Speaker 5
41:12
It could be, as you say, it could be some other consensus mechanism. I guess the, yeah, not to belabor the point, but again, the framing of sort of layer 0 itself, inheriting whatever that sort of level of trustlessness or permissionless is, the problem there is basically, you know, that could apply to many other things that I think we would all agree are explicitly centralized, right? Like, in other words, why, why wouldn't that same argument apply to a system that quite, you know, a smart contract that quite literally has arbitrary upgradability from a single admin key? Um, you could of course argue that, okay, the, you know, the control of that admin key could be anything, right?
Speaker 5
41:48
But to say that therefore the system sort of inherits that security or the system itself is trustless is, you know, does feel, feels a little backwards. And I did want to give you the chance, I don't mean to like put you on the spot here, but you know, we've been, you know, we've been clear in our criticism, but, and as you say, you know, there's this question of how it's presented in various places. I did want to just give you the, I just wanted to say this, that I did notice, we're sort of focusing on the white paper, which as I said, does use the word trustless pretty concretely. I noticed sort of elsewhere, I don't see that word on your blog and things like that.
Speaker 5
42:20
It almost seems like, you know, I even see the same title with the word trustless taken out on the website and things like that. So yeah, again, I don't mean to put you on the spot. And if this is like a marketing or business question you don't want to address now, that's fine. But I just wanted to sort of, I was just wondering if there is some sort of shift going on.
Speaker 5
42:35
And if you guys are thinking internally about how you present it. Yeah.
Speaker 6
42:40
Yeah, no, I again, I think, potentially totally viable. I think what you're describing with like a single key isn't totally accurate. It's more like does a smart contract that live on top of Ethereum's like inherent Ethereum's properties, right?
Speaker 6
42:56
Like layer 0 itself isn't anything because layer 0 itself doesn't do like we don't message there isn't like a layers or a thing that you're messaging right you're at the application level or choosing some constructs to create this exchange between networks right you're creating this this state share this data messaging passage between networks and you're sort of assigning what that looks like to each. So again, I guess maybe you can say the use of trustlessness is optimistic in the sense that the application is going to choose something that sort of fits that definition by choosing the correct counterparties. But Again, we do think there are lots of applications who don't necessarily care about that will choose lesser priorities. And I think ultimately, like, I've tried to be as explicit as possible in how I lay out my Twitter threads and how I talk about everything.
Speaker 6
43:43
And that all of this ultimately is a decision that rests at the application layer. And like we go, like you move from basically 1 systemic pool of risk to like narrow bands of application specific risk. And that application specific risk lives at what the application chooses. Ultimately every application has its own security properties.
Speaker 6
44:02
Many of them will share the sort of band of risk. So maybe that sort of shared risk is, you know, maybe it's Chainlink as an Oracle, and it's, you know, big Relayer A, whether that's, you know, some big application like Aave, or whether that's some big entity like Coinbase, like, yeah, there's probably lots of small applications, you say, hey, I'll opt into that band of security, I'm basically willing to undergo that. But then again, you may have things that look completely different, where you start looking like again, where it's more like the entire validator set of a network, now is the 1 passing this sort of state data for that entire network, right? So you're inheriting the properties of that network when dealing with that network in any manner.
Speaker 6
44:39
But again, I think it's important to make it very clear that all of that was just application layer and we don't Like we don't have any control over that. I cannot make any claim over the level of, yeah, over the trust level of any individual application. It's basically which band they assign themselves to and the properties of that.
Speaker 3
44:58
Yeah, I think this is quite urgent. Is it okay if I make a quick point?
Speaker 1
45:03
Yeah, yeah, go ahead.
Speaker 3
45:05
I think this is actually a really cool topic to talk about because it highlights the kind of shift from monolithic channels where all applications are coupled to the same interop channel to this idea that applications can be more custom or fine with the channel securities that they choose. So for example, with IBC, every application in Cosmos kind of relies on the IBC channel security, which Primo, to your point, you may be arguing that that's kind of heavy handed. Like, why is the entire system subsidizing a header relay if you're a gaming app that is transporting high frequency, low value packets?
Speaker 3
45:43
It's not really. You don't need that much security, right? Like, in the conventional world, you may want to use UDP instead of TCP because UDP is much lighter. But the industry is frankly not yet there to be able to talk about it at this level.
Speaker 3
45:57
Like this is quite inside baseball for people who spend their like entire day working on interoperability And most people are just now kind of understanding that bridges are 1 application that are built on top of generalized interoperability channels. And so the challenge for me is when, for example, with Nomad, we're very clear that the trade-off in the channel that we make is with latency. We try and minimize trust, but it has a very real trade-off of having to introduce this dispute window where fraud proofs can be settled. And so when we're having these nuanced conversations, and then I hear, oh, well, why don't you use layer 0?
Speaker 3
46:35
It solves the trilemma. Everything works perfectly. It gives me flashbacks to the EOS days where it's like in the scalability trilemma, people were saying, oh, we've solved everything. We're fast, we're cheap, we're decentralized.
Speaker 3
46:47
And if you've been working in the protocol space for a while, you know that there are invariants here, and it's hard to solve things without pushing something else out. And so maybe the ask or the conversation here is happy to chat more around this like application specific channel tech, but can we be more nuanced when we're doing it when we're educating the public and kind of trying to move the industry forward so they make good decisions? Otherwise, you're encouraging people to take risks that they're not aware of.
Speaker 4
47:15
So I'd like to make a couple of quick points here. And I think 1 of them is may actually is going to be a really interesting discussion because it may actually be controversial even amongst the co-hosts right now. So the first point is that just kind of like following on what Pranay said, like the fundamental innovation that is missing right now with Bridges isn't the, is basically figuring out how to actually create new verifier models that give us better trade-offs, right?
Speaker 4
47:46
So that we're not necessarily having to trade off trust minimization in order to have a good experience and be deployed everywhere. That is, like fundamentally, that is where the whole space is in terms of bridging. And so it's important to kind of like mention that like, you know, like layer 0 is only ever going to be as good as the best possible verifier that you could plug into it for a given set of chains or a given application. But I think this brings me to the second point, which is I'm actually going to push back on the concept that applications should be responsible for their own security.
Speaker 4
48:24
And my rationale here is twofold. First is the vast, vast majority of application developers have no idea how to evaluate the security of these systems. And I think like I don't think that that's going to change because I think we still have a very large number. We still have yet to kind of like cross the chasm into the mainstream set of developers that would be that will be entering the space in the next few years.
Speaker 4
48:49
And those people are going to be even less knowledgeable about the trust tradeoffs and about crypto economics in general to be able to make fair evaluations of these criteria. And the reason that this is a problem is that in the layer 0 model, the user, and like the whole idea behind blockchains is that you wanna remove the trust between the user and any set of intermediary parties so that the user now only needs to trust the chain. And chains have a very easily verifiable trust model. It's fairly easy to understand where their security comes from, and it's fairly difficult to attack them.
Speaker 4
49:25
And so the core thesis is that this is why building applications on blockchains is so much easier and why they can be so much more composable is because they all inherit the same security risk, right? You build a set of DeFi projects on top of Ethereum, the risks that they contain are like the economic risks of their protocols, but they don't add trust vectors. And so it allows us to build up these really, really heavily composable systems that don't have potential trust weaknesses at their core, since they're all relying on the same trust model. In the layer 0 case, you're explicitly saying that the application is responsible for doing this.
Speaker 4
50:06
So this means that the user must now trust the application layer itself directly. Now, while it's true that even with existing applications, the dApp could just very well ship a version of the front end that steals the user's funds. And that is certainly a point of trust. However, in general, you can pretty clearly and coherently point to the application's security model because it's fairly easy to understand that, like, if you're just interacting with the contracts directly, and if you're technical, you know exactly how that system is going to work because you can see exactly how the code works.
Speaker 4
50:41
And that's the big problem here is that I think that this introduces an additional assumption for the user, which is that they trust the application. And in many cases, it could be many nested applications where the user doesn't even know that that's happening. They trust that these nested applications have chosen the users, basically an acceptable trust model for the users correctly. And that, I think, largely what we've seen is that users are not really going to be able to like ascertain whether that's true.
Speaker 4
51:14
And they're just going to kind of ape into stuff. And if something at the base layer of 1 of these systems that is using layer 0 ends up getting economically attacked because it was relying on a Tendermint validator set, and that Tendermint validator set was corrupted, it's going to be extremely unclear to users what actually broke. And it presents this like massive inherent security risk to any project that builds on top of projects that are building on top of layer 0.
Speaker 6
51:45
So I'm just gonna respond super quickly, just gonna have to jump on another call right after this. Completely agree that most applications both should not and likely do not want to manage their own security. So 100 percent aligned there, like clearly, their defaults.
Speaker 6
52:00
Like people don't need to think about that if they don't want to. The counter argument is that not all applications should need to opt into the same exact security model. So a very easy example of this is applications building from, you know, an optimistic rollup to, you know, a chain basically, and making the decision of whether or not they want to bypass optimistic role, but they want to wait for the challenge period to be over, right? Like, it's, it's abundantly clear that that decision, most likely, did not be the same for all use cases.
Speaker 6
52:31
And most applications do not want to be. Again, I think we're using applications fairly loosely here in that, an application in this case is just like a contract on each chain. It's not like an application where it's like Web2 and they could just change things whenever they want. You have application that's a single contract that lives on each chain that does 1 specific function in the same way that you were saying, you know, had this existed, you know, a year, year and a half ago, as you were writing the connect stuff, like you could have built connect into this structure.
Speaker 6
52:58
The whole point is sort of modularity. So the whole point, but I also do agree with you that it will be problematic in time as this gets abstracted away as some of these sort of primitives are built and then people build on top of those primitives and other people sort of compose those applications well like, you know, do the third layer or like fourth layer user sort of understand that what they're actually inheriting in the cross-chain portion of this is the underlying sort of security model of the primitives, not necessarily like layer 3 or layer 2 on the application layer. And so I, you know, like that comes down to education and everything else, sort of the upside is modularity of design, the ability to actually create something that, again, sort of accomplishes what these applications want to accomplish now and evolve that piece over time. So like abstracted away from what the validator models are now and assume that like most things in time, those are going to get better and better.
Speaker 6
53:55
We're going to sort of like that will evolve. The whole point is that this system is modular enough that that can evolve within applications can opt into those new sort of security constructs. So I do have to jump, I want to say this is, it was actually great. I super enjoyed having you guys here chatting about this stuff and would love to do this anytime.
Speaker 6
54:15
So thank you all.
Speaker 2
54:17
Yeah, thank you, Brian.
Speaker 4
54:18
Thanks for doing it.
Speaker 2
54:19
Really, really great of you to kind of come up here and address some of our comments in a constructive way. We're really kind of pleased that, you know, to have you on. We're kind
Speaker 5
54:28
of wrapping up here. It's the
Speaker 2
54:29
end of the top of the hour, but I'd love to pass it over to everybody else first. And 1 final word before we bounce.
Speaker 1
54:38
I can go since I can just follow up
Speaker 4
54:40
on Brian's comment. So I definitely like the idea of modularity and interoperability. We've actually been pushing this kind of messaging ourselves, like basically the creation of a modular interoperability stack, where you leverage different interoperability systems on top of 1 another, working in tandem to be able to offset some of the tradeoffs of any single given system.
Speaker 4
55:03
So the example that we're running with right now is you have NXTP, which is a protocol for sending transactions trustlessly across chains, and It's specifically geared towards transfers that where you have some sort of verifiable owner. And so it's a user or a multi-sig or something like that that is making a transfer across chains that is capable of verifying that they did that transfer correctly. And then you have a system like Nomad, which is a higher latency, more generalized communication method that allows you to do more sophisticated things, like minting a token across chains, like creating a synthetic asset across chains or like any kind of like arbitrary operation that could exist. Like you can think of a complex example, it would be like, you know, a DAO making, updating the state of some set of global variables on a different chain.
Speaker 4
56:01
And that can only happen with a trust-minimized, neuralized communication layer. Now, the cool thing of having the sort of cool part of having these things work together in a modular way is that you can kind of offset the trade-offs, right? So if Nomad's trade-off is this like 30-minute cool-down window, you can kind of offset that by saying, okay, well, from a practical perspective, the people that are really going to care about the 30-minute latency are going to be end users, right? It's not really going to be like contracts, institutions, like applications themselves.
Speaker 4
56:35
It's going to be the end user that has to interact with the system and has to wait for 30 minutes. And so that means that the vast majority of cases, you're going to have an end user. If you layer Connext on top of Nomad, in the vast majority of cases, you can make it so that end users get this perfectly trustless experience where they're just going cross-chains instantly. And then you still retain the generalizability properties of the underlying Nomad system.
Speaker 3
57:02
Yeah, sorry. The way I contextualize this is like what I said earlier where it's like whack-a-mole, you push something in, something else must pop out. And in this case, like if we come back to scalability, Arjun, you have this really pithy and wise saying, which is interoperability is scalability.
Speaker 3
57:20
Because the scalability trilemma is speed, security, decentralization. And basically what the industry moved towards to with nuance is instead of trying to do vertical scaling, we're doing horizontal scaling. So you have a lot of execution environments with more block space that are then connected via asynchrony via these interoperability channels. And so now when we have this asynchrony, Nomad, for example, chooses to increase the latency of the asynchronous channel in order to allow people to submit fraud proofs and increase the security or minimize the trust there.
Speaker 3
57:56
With Connext, what we can do is we can throw capital at the problem, suffer a little bit of capital inefficiency in order to mitigate the asynchrony. But at the end of the day, there's still a real trade-off that you're making in the real world. And part of what I got out of this conversation and what I'd like to talk about next time, because Arjun, I may actually want to push back on applications being able to choose their channels. I think we'll get to a much cooler place with that.
Speaker 3
58:22
But the thing I'd like to explore is we are very early in understanding interoperability. And because we have the burden of educating people and making sure that folks understand the risks that they're taking, it leaves an opportunity for a natural misalignment to emerge from engineering and marketing. So when Primo came up here, like he had a lot of very nuanced points that I think we could cover in the next session. But the natural kind of forcing function of marketing is to kind of blur over this a little bit and make the product that you're selling seem like the best thing since sliced bread.
Speaker 3
58:58
And so how do we advance this industry while trying to build products and how do we explore the nuance and the trade-offs that we're making is something I would like to double click on in a future session.
Speaker 4
59:09
I have yet to find a bridge project that explicitly doesn't claim that it's trustless.
Speaker 5
59:13
Right, yeah. So on that note, here's in terms of, I think there's like a pretty interesting distinction that came out of this that I'm still trying to get my head around, but I'll do my best to articulate it, where I actually think talking about it in terms of the application layer is maybe not quite the root of the issue. I think there's kind of, if we talk about the sort of systems we're talking about systems for scalability, layer twos, bridges, and so on, you can kind of put them into these 2 categories where you have systems that kind of have their own security model, have their own trust model, and then we can pretty sort of universally say that anything building on top of them or anything that integrates with them sort of inherits that trust model.
Speaker 5
59:50
Right. So something like arbitrage which I would say is trustless something building on top of that you know inherits that it gets it gets arbitrage trust arbitrage trustlessness. I think same with Kinect. I think you know that you have like crypto economic security or trust minimization.
Speaker 5
01:00:02
Something that's integrating with that is you know taking on those security assumptions with layer
Speaker 1
01:00:06
0.
Speaker 5
01:00:07
I think maybe the right way to think of it is it's in this other category, where the the fundamental trust model there is by design, at its sort of at its layer 0, at its base level, by design, its trust model is inherited from some other system, right? And I agree with, I think, a few of us said, including Arjun, that that is potentially a very useful infrastructure as sort of kind of a message passing layer, as sort of just like a universal interface that veterans can use. But the fact that it's in this other category where it doesn't, it's more like it's, I guess to be generous, you could say it's trust agnostic or something like that.
Speaker 5
01:00:44
That might be useful, but it's just a total, it's just very, very not right to say that it itself is trustless. So I think we sort of don't quite have the language for this yet, but I would try to figure out some name for that category of systems. It's more like infrastructure or something like that, that inherit trust, put layer 0 in there. And then I think, yeah, it's fine.
Speaker 5
01:01:04
But yeah, you just really shouldn't be calling it trustless.
Speaker 4
01:01:08
I think the core of it is going to end up, and I'm sure this is a part of the reason why it's talked about in the way that it is by the team. But like, you know, if you kind of look at it from the perspective of like, OK, this is infrastructure to basically take read data from 1 chain, post it to another chain, that starts putting it into the same territory as just like simple cross-chain relayers and keepers, right? So that would be things like Gelato, Keeper Network, Biconomy, etc.
Speaker 4
01:01:36
And that isn't necessarily the category that LayerState wants to be put into, but that is certainly a part of the consequence of this is that if the whole point of building a bridging system is
Speaker 6
01:01:47
to introduce
Speaker 4
01:01:49
a type of trust model that allows you to do certain sorts of things, externalizing that means that you are now, you are infrastructure for bridges, which is definitely an important thing, and it's definitely an important piece of the puzzle, but it's not necessarily the bridge itself.
Speaker 5
01:02:04
Yeah. Yeah, go ahead, Connor.
Speaker 2
01:02:07
Yeah, so thanks for sticking with us, for those of you that are still here and listening. Just wanted to point out the pinned tweet. If you have anything you'd love to hear for the next episode or subsequent episodes of Burning Bridges.
Speaker 2
01:02:18
Definitely give us your suggestions. We're kind of excited to hear what the audience is interested in hearing about. We're probably going to schedule the next session 2 weeks from today, which I think is the 17th. Some of us will be in Denver, so it might be a special Burning Bridges in Denver episode.
Speaker 2
01:02:34
If you're going to be in Denver, hit us up. Love to hang out. Yeah. Thank you so much.
Speaker 2
01:02:40
And again, Brian's not here, but props to Brian for being so gracious with our criticism.
Speaker 4
01:02:49
Definitely, definitely appreciate that. Cool, yeah, thank you everybody. Just a quick like operational, so we, the Burning Bridges session 1 is recorded and is being uploaded to YouTube right now.
Speaker 4
01:03:04
Actually doing it at the moment. And then session 2 has also been recorded. And so we'll be editing that and putting that up within the next couple of days. So I'll drop the link on Twitter as well.
Speaker 2
01:03:17
Have a good weekend. We'll see you next time, everybody. Cool.
Speaker 6
01:03:20
Take care, y'all.
Omnivision Solutions Ltd