I want to clear up @THORChain's relationship with #IBC and why it's made the decisions its made.
IBC is a good bridging design but doesn't meet the design specifications and requirements of the @THORChain project. 🧵
THORChain will be implementing IBC, but NOT for interfacing with its liquidity pools. Instead, you can beam out $RUNE and THORChain synthetic assets to other cosmos chains via IBC, but not beam in external assets via IBC. This will contribute a massive amount to the IBC ecosystem
THORChain uses its own bridging design called "Bifrost" for its pools. This was designed & developed before IBC even existed. So IBC wasn't really an option from the start. But even if it was it would have not been a good choice for the goals and design requirements of THORChain
IBC was designed to bridge two cosmos chains. It does NOT work with the greater crypto sphere out of the box. It is possible using a shim layer of some kind, but that creates more complexity and security concerns as each chain is implemented. This is why IBC is NOT chain agnostic
THORChain needed to be chain agnostic from the start, and connect to any chain no differently than any other chain. I see targeting a subset of chains is a "half solution" to the cross chain problem. Almost all cross chain DEXes out there are making this very mistake today.
Another important design choice for THORChain, is not using wrapped or pegged assets. There are a host of reason why wrapped or pegged assets are a non-starter. 1) a wrapped asset is not the asset (ie a wrapped bitcoin is not a real bitcoin).
2) you cannot economically secure wrapped assets without a trusted central entity. This is because there is a strong decoupling between the value of the assets that are securing the network, and the value of the assets its securing.
3) Holding a wrapped asset continuously retains additional risk. You require the bridge to stay up to maintain its value. Swapping from L1 <> L1 on THORChain, it doesn't matter if THORChain dies the next day. You still have your L1 asset, therefore it has less risk by design
IBC transfers asset via wrapping them. Like Ren or WBTC, IBC locks up the source asset in the source chain, and mints a 1:1 representative asset on the target chain. THORChain does not operate this way & believes this isn't the right approach to getting #DeFi to be more inclusive
Bifrost's design insures a "carrot & stick" to directly incentivize actors to be participate & facilitate cross chain comms. IBC wasn't designed with any economics in mind. It requires "altruistic" actors to facilitate comms, but this could change in a future spec of the protocol
THORChain is permissionless and interfaces with other chains permissionlessly. #Bitcoin didn't need to make any code changes to allow THORChain, nor is there anything #Bitcoin can do to stop @THORChain. This is not the case with IBC's design.
Putting aside these design requirements, implementing two types of cross chain bridges goes against basic & fundamental standards of code architecture. It would add a lot of code to write, secure & maintain/debug while not offering any value that isn't already achieved by Bifrost
As I said before, IBC has a good bridging design. And for most cosmos projects, it is probably a good choice to adopt/use. I certainly may use in a future project, but it is not a good fit for this one.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Chad Barraford #BRINGTHECHAOS

Chad Barraford #BRINGTHECHAOS Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @CBarraford

17 Sep
Now that @THORChain is BACK, we should reflect on what it took to get here. Follow the 🧵

1/ Multiple external audits have been conducted, of which those audits found nothing critical (will be released publicly soon).
2/ Internal audits did find critical issues, which were of course patched.
3/ A new team was born comprised of highly experienced white hat hackers. This "red team" takes an adversarial perspective on all code changes and must approve all changes. As well as pierce current code for potential threats/exploits they can find.
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(