LogoLogo
  • Imua
    • About
  • Manifesto
    • The Problems
    • The Principles
  • Architecture
    • Imua Design Principles
    • Imua Network
    • Imua Modules
    • Client Chain Bridges
      • Trustless Verification of Client Chain State
      • Handling Race Conditions between Imua and Client Chains
    • Client Chain Contracts
  • Concepts
    • Ecosystem
      • Re/stakers
      • Operators
      • Services (AVS)
        • Service Integration with Imua
        • Service Committee
        • Service Integration Details
    • restaked Proof-of-Stake (rPOS)
    • Multi-Token Restaking
    • Multi-Chain Restaking with Trustless Bridging
    • Voting Power
    • Price Oracle
    • Flexible Integration with AVS
    • Tribe Staking
  • Governance
  • Risk Management
    • Risk Analysis
      • Risk Modeling
      • Risk Parameters
      • Crypto-Economic Risk
      • Unintended Slashing
      • Black Swan Events
    • Risk Mitigation
      • Smart Contract Simplicity
      • Audits
      • Slashing Prevention
      • Slashing Vetos
      • Insurance Pools
      • Circuit Breakers
  • Components
    • Testnet
    • Oracle Module
      • Reaching Consensus on Asset Prices
      • Penalty
      • Implementation Detail
    • Smart Contracts
    • Explorer
    • Registry
  • Validator Setup
    • Prerequisites
    • Node Install
    • Compiling Binary from Source
    • Oracle Price Feeder
    • Running the Node
    • Snapshot
    • Register Option 1 (Bootstrap)
    • Register Option 2 (Post Network Launch)
    • Deposit Tokens
    • Delegating Tokens
    • Confirm Election Status
    • Faucets
    • Managing The Validator
    • Security Best Practices
    • Risks & Mitigation
    • Participation in Governance
    • FAQs & Resources
    • Testnet v7 to v8 upgrade
  • Testnet Upgrade to v1.1.1
  • AVS Setup
    • AVS Overview
    • Prerequisites
    • Building the AVS in Imua
    • Hello-World-AVS Example
    • Becoming AVS Operator
    • AVS Register and Deploy
    • AVS Task Example
    • Enhanced and Automated Edition of hello-avs integration guide&example
  • Whitepaper (2023)
    • .pdf
  • FAQ
    • What problems is Imua solving?
    • What are the main design trade-offs that had to be made with an omnichain design?
    • Does the omnichain design imply added trust assumptions (relative to a single-chain design)?
    • What concurrency-related challenges would you face with a different design?
    • How does Imua integrate with new chains?
    • Do specific chains prove unique challenges w.r.t. integration?
    • How is the cross-chain communication is achieved?
    • What are the known attack / censorship vectors here, if any?
    • Are the restaked tokens being pooled in a centralized account?
    • Who will run the validators in the Imua network?
    • Is Imua an AVS?
    • How does Imua address the risks of overloading L1 social consensus?
    • Does the Imua queuing system raise concerns around latency?
    • What are the main benefits of an omnichain design?
Powered by GitBook
On this page
  1. FAQ

Does the omnichain design imply added trust assumptions (relative to a single-chain design)?

Yes and no.

Yes, in that Imua as a separate network will mean that all the operations of restaking, withdrawal, slashing etc. will be dependent on the correct operation of the Imua protocol. If Imua halts, then related operations will not work until the network recovers. However, no user assets are at risk since the assets stay in the client chain (e.g. BTC, ETH, SOL, etc) and Imua doesn’t have permission to transfer assets.

To mitigate the risk of the new trust assumption, Imua uses the industry-proven Cosmos SDK and Tendermint consensus mechanism for the chain infrastructure and will conduct extended auditing to minimize code-related risks. On protocol security, the network will be bootstrapped using restaked native tokens from the initial L1 chains that Imua supports, which provides the system with a great token-economic security from the very beginning.

No, in that since Imua is built as a separate network, then the connection between Imua and client chains can be implemented using specialized Zero-Knowledge (ZK) bridging primitives that are as trustless as the Imua network itself. The reading of restaked assets in client chains by Imua can be done by a ZK light-client based bridge, which is fully trustless and most secure. The control of restaked assets in the client chain is done by Imua sending transactions signed collectively by Imua validators using a Threshold Signature Scheme (TSS), an efficient MPC protocol. These bridging operations are as trustless as the Imua network, so as long as Imua network is secure, the bridge is secure. No additional trust assumption is relied on third-party bridge solutions.

PreviousWhat are the main design trade-offs that had to be made with an omnichain design?NextWhat concurrency-related challenges would you face with a different design?

Last updated 2 months ago