A community for the latest discussions about the cutting edge of crypto design, it's culture and significant crypto news. Decentralize everything. Check out our [Community Guidelines](https://relevant.community/crypto/post/6122269e61d1cd005a877277/62427d3ed587ad005b647828)
53475 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
A community for the latest discussions about the cutting edge of crypto design, it's culture and significant crypto news. Decentralize everything. Check out our [Community Guidelines](https://relevant.community/crypto/post/6122269e61d1cd005a877277/62427d3ed587ad005b647828)
53475 Members
We'll be adding more communities soon!
© 2020 Relevant Protocols Inc.
Relevant
Hot
New
Spam
Relevant
Hot
New
Spam
0
173
0
173
"Although cross-chain protocols provide users with the convenience of on-chain interaction, security is still worrying. Due to the increase in demand for transactions on the chain, the scale of cross-chain funds hosted by cross-chain bridges has also become larger and larger, and it has become the favorite target of hackers, resulting in cross-chain bridges becoming a high incidence of security incidents."
"Although cross-chain protocols provide users with the convenience of on-chain interaction, security is still worrying. Due to the increase in demand for transactions on the chain, the scale of cross-chain funds hosted by cross-chain bridges has also become larger and larger, and it has become the favorite target of hackers, resulting in cross-chain bridges becoming a high incidence of security incidents."
Some low-ranking comments may have been hidden.
Some low-ranking comments may have been hidden.