Interoperability & Bridges Overview
Bridges move assets across chains, enabling liquidity and app ecosystems to interconnect. You'll learn how wrapping works, why bridges are high-value targets, and safer ways to bridge.
Who Is This For?
- •Users moving tokens between chains
- •Analysts evaluating cross-chain protocols
Learning Objectives
- 01Explain how token wrapping and lock-and-mint models operate
- 02Identify major risks in bridge design
- 03Choose safer bridging approaches for everyday use
Why Interoperability Matters
Blockchains are isolated by design. Each chain has its own state, consensus, and tokens. But users and protocols need to move value between them.
Cheaper Fees
Ethereum gas can be expensive. Users bridge to L2s (Arbitrum, Optimism, Base) for 10-100x cheaper transactions.
Access New Apps
Some DeFi protocols, games, or NFTs only exist on specific chains. Bridging lets you participate in those ecosystems.
Liquidity Expansion
Protocols need liquidity on multiple chains. Bridges allow capital to flow where yields or opportunities are best.
How Bridging Works (Step by Step)
Click through to see the lock-and-mint process:
Step 1: You Have ETH on Ethereum
You hold native ETH on Ethereum mainnet and want to use it on Arbitrum.
Bridge Designs
Not all bridges work the same way. Each design makes different tradeoffs between speed, cost, and security.
Compare Bridge Designs
Lock-and-Mint
Tokens are locked in a smart contract on the origin chain, and equivalent "wrapped" tokens are minted on the destination chain. To go back, wrapped tokens are burned and originals are released.
Pros
- ✓ Conceptually simple
- ✓ Supports any token
- ✓ Well-established pattern
- ✓ Maintains 1:1 backing
Cons
- ✗ Wrapped tokens add complexity
- ✗ Smart contract risk (large TVL)
- ✗ Validator trust required
- ✗ Can be slow (waiting for finality)
Design Comparison
| Design | Speed | Trust | You Receive |
|---|---|---|---|
| 🔒 Lock-and-Mint | Slow-Medium | Validators | Wrapped tokens |
| 💧 Liquidity Network | Fast | Economic | Native tokens |
| 🔐 ZK / Light-Client | Medium | Math / proofs | Varies |
Why Bridges Get Hacked
Safety Checklist
Bridges carry real risk. Use this checklist every time you bridge tokens.
Pre-Bridge Safety Checklist
Check off each item before bridging:
Which Bridge Should I Use?
Select your scenario for a recommendation:
Casual User
Moving $50-500 for DeFi or NFTs
Common Mistakes & Gotchas
Bridging errors can mean lost funds. Avoid these costly mistakes:
⚠️ Golden Rule: If you're not sure about a bridge, use the chain's canonical (official) bridge. It's usually slower but carries the least additional trust assumptions.
Knowledge Check
Let's see how well you understand blockchain bridges and interoperability.
How does a lock-and-mint bridge work?
Why are bridges frequent hack targets?
Name one precaution before sending large amounts over a bridge:
What advantage do liquidity network bridges have over lock-and-mint?
What makes ZK/light-client bridges different from other designs?
Part 3 Complete!
You've finished the DeFi Deep Dive. You now understand tokens, stablecoins, NFTs, tokenomics, and bridges.