π‘οΈ Shared Security: EigenLayer Restaking
Discover how protocols share Ethereum's economic security
Explore the future of cross-chain technology
Your Progress
0 / 5 completedShared Security Models
The Bootstrap Problem
New blockchains face a chicken-and-egg problem: you need validators for security, but validators only join valuable chains. Shared security lets new chains inherit security from established networks like Ethereum or Cosmos Hub, enabling native interoperability without bridge trust assumptions.
π Security Model Comparator
Ethereum Rollups
Post transaction batches + proofs to Ethereum. Inherit full Ethereum security.
Deep Dive: Security Models
Ethereum Rollups (Arbitrum, Optimism, zkSync)
Post transaction batches to Ethereum L1. Optimistic rollups use fraud proofs (assume valid, challenge if fraud), ZK rollups use validity proofs (prove correctness with math). Inherit full Ethereum securityβcan't be compromised unless Ethereum itself is.
Polkadot Parachains (Moonbeam, Acala, Astar)
Win parachain slot via auction (~$10M+ locked for 96 weeks). Share Relay Chain validator set (300+ validators). Native XCM messaging for cross-parachain callsβno bridges needed. More autonomy than rollups but must renew auction.
Cosmos Interchain Security (Neutron, Stride)
Consumer chains rent Cosmos Hub validator security. Pay Hub validators with revenue share. Can opt-in specific validators (partial sets). Most flexible: launch fast, native IBC messaging, customize validator set. Newest model (2023).
Independent Chains (Avalanche, Solana, BSC)
No shared security. Must bootstrap own validator network and liquidity. Complete autonomy but highest cost and risk. Interoperability only via bridges (trust assumptions). Best for established chains with strong communities.
Security vs Autonomy Tradeoff
Full L1 security inheritance. Cannot be compromised without attacking Ethereum. Best for high-value DeFi. Limited autonomyβmust follow L1 rules.
Shared validator security but own runtime. Can customize consensus, governance, economics. Must win auction and renew. Native cross-parachain messaging.
Opt-in validator security with revenue sharing. Launch fast, maintain sovereignty, native IBC. Newest model, most flexible but less battle-tested.
Complete control but must bootstrap everything. High cost and risk. Best for established chains with strong communities and existing liquidity.
π‘ Choosing a Security Model
Consider these factors when evaluating shared security:
- β’Launch Speed: Rollups fastest, parachains need auction, independent slowest
- β’Cost: Rollups moderate, parachains $10M+ auction, ICS revenue share, independent bootstrap
- β’Autonomy: Rollups limited, parachains high, ICS very high, independent complete
- β’Interoperability: Native messaging within ecosystem, bridges to outside