Cross Chain Protocols: A Look At Recent Exploits

How Cross Chain Protocols Work

Inside the Attack: pNetwork

Inside the Attack: Synapse

Inside the Attack: Polynetwork

Inside the Attack: THORchain

Lessons Learned

About Router Protocol

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store