Listen "Who Secures Crosschain Messages?"
Episode Synopsis
In this episode of Composable, Alysia and Ellie explore the security of crosschain messages. They examine notable bridge attacks, analyze what makes crosschain messages vulnerable, and discuss various security approaches, including multisigs and Trusted Execution Environments (TEEs). The episode breaks down the technical aspects of securing crosschain messages while considering the trade-offs between speed and usability.Key Topics Covered:Notable bridge attacks like Ronin, Wormhole, and OrbitThe anatomy of crosschain messagesSecurity vulnerabilities in bridge systemsMultisig security models and their limitationsTrusted Execution Environments (TEEs) and their role in securing crosschain messagesTrust assumptions in various other security approachesComposable is a bi-weekly podcast exploring crypto's building blocks. Hosted by Alysia and Ellie, and brought to you by Espresso. Find us on X:Composable — @composablepodAlysia — @alysiatechEllie — @ellierdavidson
More episodes of the podcast Composable: Exploring Crypto’s Building Blocks (an Espresso Pod)
Is Finality Even Real?
29/08/2025
Is the FUD even real?
19/06/2025
Are TEEs even real?
01/05/2025
Are Wrapped Tokens Even Real?
23/03/2025
Show Me the Value: Web3 Hype vs. Reality
25/02/2025
Is Bridging Even Real?
06/02/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.