Cointime

Download App
iOS & Android

Deciphering the Trust Puzzle of Interoperability

Validated Individual Expert

📚 Authors: Shi Khai Wei, Raghav AgarwalLongHash Ventures🌟 Technical Prerequisite: Moderate/Advanced

Introduction

The future is multichain. The quest for scalability has led Ethereum towards rollups. The shift towards modular blockchains has reignited attention on app chains. And over the horizon, we hear whispers of application-specific roll-ups, L3s, and sovereign chains. But all this has come at the cost of fragmentation, and current bridges are often limited in functionality and rely on trusted signers for security.

What will the endgame of an interconnected web3 look like? We believe that bridges will eventually evolve into cross-chain messaging or “Arbitrary Message Passing” (AMP) protocols to unlock new use cases, by allowing applications to pass arbitrary messages from source to destination chain. We will also see a “trust mechanism landscape” emerge, where builders make various tradeoffs in usability, complexity, and security.

Every AMP solution needs two critical capabilities:

  • Verification: The ability to verify the validity of the message from the source chain on the destination chain 
  • Liveness: The ability to relay information from source to destination

Unfortunately, 100% trustless verification is not realistic and the users are either required to trust code, game theory, humans (or entities), or a combination of these, depending on whether the verification is being done on-chain or off-chain. 

In this essay, we will divide the overall interoperability landscape vertically based on trust mechanism used and horizontally based on integration architecture.

Trust Mechanism:

  1. Trust Code and Math: For these solutions, on-chain proof exists and can be verified by anyone. These solutions generally rely on a light client to either validate the consensus of a source chain on a destination chain or verify the validity of a state transition for a source chain on a destination chain. Verification through light clients can be made much more efficient through Zero Knowledge proofs to compress arbitrarily long computations offline and provide a simple verification on-chain to prove computations.
  2. Trust Game Theory: There is an additional trust assumption when the user/application has to trust a third party or network of third parties for the authenticity of transactions. These mechanisms can be made more secure through permissionless networks coupled with game theoretics such as economic incentives and optimistic security. 
  3. Trust Humans: These solutions rely on honesty from the majority of the validators or independence of entities relaying different information. They require trust in third parties in addition to trusting the consensus of the two interacting chains. The only thing at stake here is the reputation of the participating entities. If enough participating entities agree that a transaction is valid, then it is considered valid. 

It is important to note that all solutions, to a certain degree, require trust in code as well as humans. Any solution with faulty code can be exploited by hackers and every solution has some human element in the setup, upgrades, or maintenance of the codebase.

Integration architecture:

  1. Point-to-Point model: A dedicated communication channel needs to be established between every source and every destination.
  2. Hub and Spoke model: A communication channel needs to be established with a central hub that enables connectivity with all other blockchains connected to that hub.

The Point to Point model is relatively difficult to scale as a pairwise communication channel is required for every connected blockchain. Developing these channels can be challenging for blockchains with different consensus and frameworks. However, pairwise bridges provide more flexibility to customize configurations, if needed. A hybrid approach is also possible, for example, by using Inter-Blockchain Communication protocol (IBC) with multi-hop routing via a hub, which removes the need for direct pairwise communication, but reintroduces more complexity in security, latency, and cost considerations.

Trust Code and Math

In order to only rely on code/math for trust assumptions, light clients can be used to validate the consensus of a source chain on a destination chain. A light client/node is a piece of software that connects to full nodes to interact with the blockchain. Light clients on the destination chain normally store the history of block headers (sequentially) of the source chain which is enough to verify the transactions. Off-chain agents like relayers monitor the events on the source chain, generate cryptographic inclusion proofs, and forward them along with the block headers, to the light client on the destination chain. Light clients are able to verify the transaction as they store the block headers sequentially and each block header contains the Merkle root hash which can be used to prove the state. Here is an overview of the key features of this approach:

Security

During the initialization of the light client, trust assumptions are introduced. When creating a new light client, it is initialized with a header from a specific height on the counterparty chain. However, there is a possibility that the supplied header could be incorrect, potentially tricking the light client with fake headers. Once the light client has been initialized, no further trust assumptions are introduced. However, it is worth noting that this initialization process relies on a weak trust assumption, as anyone can verify it. Additionally, there is a liveness assumption on the relayer, as it is responsible for transmitting the information.

Implementation

The implementation of the light client depends on the availability of support for the cryptographic primitives required for verification. If the same type of chain is being connected, meaning they share the same application framework and consensus algorithm, then the implementation of the light client on both sides will be the same. For example, the Inter-Blockchain Communication (IBC) protocol is used for all Cosmos SDK-based chains. On the other hand, if two different types of chains are being connected, such as different application frameworks or consensus types, then the implementation of the light client will differ. An example of this is Composable Finance, which is working to enable Cosmos SDK chains to be connected via IBC to Substrate, the application framework of the Polkadot ecosystem. This requires a Tendermint light client on the Substrate chain and a "beefy" light client added to the Cosmos SDK chain. Recently, they launched the first connection between Polkadot and Kusama via IBC.

Challenges

Resource intensiveness is a significant challenge. Running pairwise light clients on all chains can be expensive, as writes on blockchains are costly. Moreover, it is not feasible to run light clients on chains with dynamic validator sets like Ethereum.

Extensibility is another challenge. The implementation of the light client varies based on the architecture of the chain, making it difficult to scale and connect different ecosystems.

Code exploitation is a potential risk, as errors in the code can lead to vulnerabilities. An example of this is the BNB chain exploit in October 2022, which uncovered a critical security vulnerability [1]  affecting all IBC-enabled chains.

To address the cost and practicality issues of running pairwise light clients on all chains, alternative solutions such as zero-knowledge (ZK) proofs offer a way to eliminate the need for trust in third parties.

ZK Proofs as a Solution for Third-Party Trust

ZK proofs can be utilized to verify the validity of state-transitions from the source chain on the destination chain. Rather than executing the entire computation on-chain, only the verification of the proof of computation is performed on-chain, while the actual computation takes place off-chain. This approach allows for quicker and more gas-efficient verification compared to re-running the original computation. Some examples include Polymer ZK-IBC by Polymer Labs and Telepathy by Succinct Labs. Polymer is working on multi-hop [2] enabled IBC to enhance connectivity while reducing the number of pairwise connections required.

The key aspects of this mechanism include:

Security

The security of zk-SNARKs relies on elliptic curves, while zk-STARKs depend on hash functions. zk-SNARKs may require a trusted setup, which involves creating initial keys for generating proofs used in verification. It's crucial to destroy the secrets of the setup event to prevent the potential forging of transactions through false verifications. Once the trusted setup is complete, no further trust assumptions are introduced. Additionally, new ZK frameworks like Halo and Halo2 eliminate the need for a trusted setup altogether.

Implementation

Various ZK proving schemes such as SNARK, STARK, VPD, and SNARG exist, with SNARK being the most widely adopted currently. Different SNARK proving frameworks like Groth16, Plonk, Marlin, Halo, and Halo2 offer trade-offs in terms of proof size, proving time, verification time, memory requirements, and the need for a trusted setup. Recursive ZK proofs have also emerged, allowing the workload of proving to be distributed among multiple computers instead of a single one. To generate validity proofs, the following core primitives must be implemented: verification of the signature scheme used by validators, inclusion of proof of validator public keys in the validator set commitment stored on-chain, and tracking the set of validators, which can change frequently.

Challenges

Implementing various signature schemes within zkSNARKs requires implementing out-of-field arithmetic and complex elliptic curve operations, which is not straightforward and may require different implementations for each chain depending on their framework and consensus. Auditing ZK circuits is a challenging and error-prone task. Developers need to familiarize themselves with domain-specific languages like Circom, Cairo, and Noir, or directly implement circuits themselves, both of which can be challenging and slow down adoption. If proving time and effort are extremely high, only specialized teams with specialized hardware may be able to handle them, potentially leading to centralization. Higher proof generation time can also result in latency. Techniques like Incrementally Verifiable Computation (IVC) can optimize proving time, but much of this is still in the research phase and awaits implementation. Longer verification time and effort will increase on-chain costs.

Trust Game Theory

Interoperability protocols that rely on game theoretics can be broadly divided into 2 categories based on how they incentivize honest behavior from participating entities:

The first category is economic security, where multiple external participants, such as validators, collaborate to reach a consensus on the updated state of the source chain. To become a validator, participants are required to stake a certain amount of tokens, which can be slashed in the event of malicious activity. In permissionless setups, anyone can accumulate stakes and become a validator. Additionally, economic incentives in the form of block rewards are provided to validators who follow the protocol, ensuring economic motivation for honesty. However, if the potential amount that can be stolen outweighs the stakes, participants may collude to steal funds. Examples of protocols using economic security are Axelar and Celer IM.

The second category is optimistic security, where solutions rely on the assumption that only a minority of blockchain participants are honest and follow the protocol rules. A single honest participant can act as a guarantee in this approach. For instance, an optimal solution allows anyone to submit fraud proof. Although there are economic incentives, it is possible for an honest watcher to miss a fraudulent transaction. Optimistic roll-ups also employ this mechanism. Nomad and ChainLink CCIP are examples of protocols using optimistic security. In the case of Nomad, watchers are able to prove fraud, although they are whitelisted at the time of writing. ChainLink CCIP plans to leverage an Anti-Fraud Network consisting of decentralized oracle networks dedicated to monitoring malicious activity, although the implementation of CCIP's Anti-Fraud Network is yet to be seen.

Security

When it comes to security, both mechanisms rely on permissionless participation from validators and watchers to ensure the effectiveness of game theory. In the economic security mechanism, the funds are more vulnerable if the amount staked is lower than the potential amount that can be stolen. On the other hand, in the optimistic security mechanism, the minority trust assumptions can be exploited if no one submits the fraud proof or if permissioned watchers are compromised or removed. In contrast, economic security mechanisms are not as dependent on liveness for maintaining security.

Implementations

In terms of implementation, one approach involves a middle chain with its own validators. In this setup, a group of external validators monitors the source chain and reaches consensus on the validity of transactions when a call is detected. Once consensus is achieved, they provide attestation on the destination chain. Validators are typically required to stake a certain amount of tokens, which can be slashed if malicious activity is detected. Examples of protocols using this implementation approach include Axelar Network and Celer IM.

Another implementation approach involves using off-chain agents. Off-chain agents are utilized to implement a solution similar to optimistic roll-ups. During a predefined time window, these off-chain agents are allowed to submit fraud proofs and revert transactions if necessary. Nomad, for instance, relies on independent off-chain agents to relay the header and cryptographic proof. ChainLink CCIP, on the other hand, plans to leverage its existing oracle network for monitoring and attesting cross-chain transactions.

Advantages and Challenges

One key advantage of game-theoretic AMPs is resource optimization since the verification process typically does not occur on-chain, resulting in lower resource requirements. Moreover, these mechanisms exhibit extensibility, as the consensus mechanism remains the same for various types of chains and can be easily extended to heterogeneous blockchains.

There are also several challenges associated with these mechanisms. Trust assumptions can be exploited to steal funds if the majority of validators collude, which necessitates the use of countermeasures like quadratic voting and fraud proofs. Additionally, optimistic security-based solutions introduce complexity in terms of finality and liveness, as users and applications need to wait for the fraud window to ensure transaction validity.

Trust Humans

Solutions which require trust in human entities can also be broadly divided into two categories:

  1. Reputational Security: These solutions rely on a multi-sig implementation where multiple entities verify and sign the transactions. Once the minimum threshold is achieved, the transaction is considered valid. The assumption here is that the majority of the entities are honest and if a majority of these entities are signing on a particular transaction, it is valid. The only thing at stake here is the reputation of the participating entities. Some examples include Multichain (Anycall V6), Wormhole. Exploits due to smart contract bugs are still possible, as evidenced by the Wormhole hack [3] in early 2022.
  1. Independence: These solutions split the entire message passing process into two parts and rely on different independent entities to manage the two processes. The assumption here is that the two entities are independent of each other and are not colluding. An example of this is LayerZero. The block headers are streamed on demand by decentralized oracles and transaction proofs are sent via relayers. If the proof matches the headers, the transaction is considered valid. While proof matching relies on code/math, participants are required to trust the entities to remain independent. The applications building on LayerZero have the option to choose their Oracle and Relayer (or host their own Oracle/Relayer), thereby limiting the risk to individual oracle/relayer collusion. The end users need to trust that either LayerZero, a third party, or the application itself is running the oracle and relayer independently and without malicious intentions.

In both approaches, the reputation of participating 3rd party entities disincentivizes malicious behaviour. These are usually respected entities within the validator and oracle community and they risk reputational consequences and negative impact on their other business activities if they act maliciously. 

Beyond Trust Assumptions: Other Considerations for AMP Solutions

While considering the security and usability of an AMP solution, we need to also take into account the details beyond basic mechanisms. As these are moving parts that can change over time, we did not include them in the overall comparison.

Code Integrity

Recent hacks have exploited code bugs, highlighting the need for reliable audits, bug bounties, and diverse client implementations. If all the validators (in economic/optimistic/reputational security) run the same client (software for verification), it increases the ​​dependency on a single codebase and reduces client diversity. Ethereum, for example, relies on multiple execution clients like geth, nethermind, erigon, besu, akula. Multiple implementations in a variety of languages are likely to increase diversity without any client dominating the network, thereby eliminating a potential single point of failure. Having multiple clients could also help with liveness if a minority of validators/signers/light clients go down due to exploits/bugs in one particular implementation.

Setup and Upgradability

Users and developers need to be aware if validators/ watchers can join the network in a permissionless manner, otherwise trust is hidden by the selection of permissioned entities. Upgrades to smart contracts can also introduce bugs which can lead to exploits or even potentially change the trust assumptions. Different solutions can be implemented to mitigate these risks. For example, in the current instantiation, the Axelar gateways are upgradable subject to approval from an offline committee (4/8 threshold), however, in the near future Axelar plans to require all validators to collectively approve any upgrades to the gateways. Wormhole’s core contracts are upgradeable and are managed via Wormhole’s on-chain governance system. LayerZero relies on immutable smart contracts and immutable libraries to avoid any upgrades, however, it can push a new library, and dapps with default settings would get the updated version, and dapps with their version manually set would need to set it to the new one.

Maximal Extractable Value (MEV)

Different blockchains are not synchronized through a common clock and have different times to finality. As a result, the order and time of execution on the destination chain can vary across chains. MEV in a cross-chain world is challenging to clearly define. It introduces a trade-off between liveness and order of execution. An ordered channel will ensure the ordered delivery of messages but the channel will close if one message times out. Another application might prefer a scenario where ordering is not necessary but the delivery of other messages is not impacted.

Source Chain Finality

Ideally AMP solutions should wait for the source chain to reach finality before transmitting state information from the source chain to one or more destination chains. This will ensure that there is a negligible probability of a block on the source chain being reversed or altered. However, in order to provide the best user experience, many solutions provide instant message passing and make trust assumptions related to finality. In this case, if the source chain experiences a state reversion after the message has been passed and tokens are bridged, it could lead to scenarios like double spending of bridged funds. AMP solutions can manage this risk through multiple approaches like different finality assumptions for different chains based on how decentralized the chain is, or by trading off speed for security. Bridges leveraging AMP solutions can put a limit on the amount of assets that can be bridged before finality is achieved on the source chain. 

Trends and Future Outlook

Customisable and Additive Security

To better serve diverse use cases, AMP solutions are incentivized to offer more flexibility to developers. Axelar introduced an approach [4] for the upgradability of message passing and verification, without any changes to application-layer logic. HyperLane V2 introduced modules that allow developers to choose from multiple choices such as economic security, optimistic security, dynamic security, and hybrid security. CelerIM offers additional optimistic security along with economic security. Many solutions wait for a predefined minimum number of block confirmations on the source chain before transmitting the message. LayerZero allows developers to update these parameters. We expect some AMP solutions to continue offering more flexibility but these design choices warrant some discussion. Should the apps be able to configure their security, to what extent, and what happens if the apps adopt sub-par design architecture? User awareness of the basic concepts behind security may become increasingly important. Ultimately, we foresee aggregation and abstraction of AMP solutions, perhaps in some form of combination or “additive” security [5].

Maturation of “Trust Code and Math” Mechanisms

In an ideal endgame, all cross-chain messages will be trust minimized by using zero knowledge (ZK) proofs to verify messages and states. We are already witnessing this shift with the emergence of projects like Polymer Labs and Succinct Labs. Multichain has also published [6] a zkRouter whitepaper to enable interoperability through ZK proofs. With the recently announced [7] Axelar Virtual Machine, developers can leverage the Interchain Amplifier to permissionlessly set up new connections to the Axelar network. For example, once robust light-clients & ZK proofs for Ethereum’s state are developed, a developer can easily integrate them into the Axelar network to replace or enhance an existing connection. Celer Network has announced [8] Brevis, a ZK omnichain data attestation platform, enabling dApps and smart contracts to access, compute, and utilize arbitrary data across multiple blockchains. Using ZK light client circuits, Celer has implemented a user-facing asset zkBridge between Ethereum Goerli and BNB Chain testnet. LayerZero in its documentation talks about the possibility of adding new optimized proof messaging libraries in the future. Newer projects like Lagrange are exploring the aggregation of multiple proofs from multiple source chains and Herodotus is making storage proofs feasible through ZK proofs. However, this transition will take time as this approach is difficult to scale among blockchains relying on different consensus mechanisms and frameworks.

ZK is a relatively new and complex tech that is challenging to audit, and, currently, the verification and proof generation is not cost-optimal. We believe that in the long run, to support highly scalable cross-chain applications on the blockchain, many AMP solutions are likely to complement trusted humans and entities with verifiable software because:

  1. The possibility of code exploitation can be minimized through audits and bug bounties. With the passage of time, it will be easier to trust these systems as their history will serve as proof of their security.
  2. The cost of generating ZK proofs will decrease. With more R&D in ZKPs, recursive ZK, proof aggregation, folding schemes and specialized hardware, we expect the time and cost of proof generation and verification to reduce significantly, making it a more cost-effective approach.
  3. Blockchains will become more zk-friendly. In the future, zkEVMs will be able to provide a succinct validity proof of execution and light client-based solutions will be able to easily verify both execution and consensus of a source chain on the destination chain. In Ethereum’s endgame, there are also plans to “zk-SNARK everything” including consensus.

Proof of Humanity, Reputation, and Identity

The security of complex systems like AMP solutions cannot be encapsulated through a single framework and warrants multiple layers of solutions. For example, along with economic incentives, Axelar has implemented quadratic voting [9] to prevent the concentration of voting power among a subset of nodes and promote decentralization. Other proofs of humanity, reputation, and identity can also complement mechanisms for setup and permission.

Conclusion

In the Web3 spirit of openness, we will likely see a plural future where multiple approaches co-exist. In fact, applications may choose to use multiple interoperability solutions, either in a redundant way, or let users mix-and-match with disclosure of trade-offs. Point-to-point solutions may be prioritized between “high traffic” routes, whereas hub and spoke models may dominate the long tail of chains. In the end, it is up to us, a community of users, builders, and contributors, to shape the topography of the interconnected web3.

Thanks for reading the Stanford Blockchain Review! Subscribe to support our work in pioneering a dedicated industry journal for Web3

About the Authors

LongHash Ventures specializes in bootstrapping Web3 ecosystems. LongHash venture funds invest in early-stage Web3 protocols, and LongHashX Accelerator partners with ecosystems and protocols to accelerate early-stage founders.

Shi Khai Wei is the general partner and chief operations officer at LongHash Ventures, a Web3-focused venture fund and accelerator. In 2021, Shi Khai was awarded Forbes 30 Under 30 in recognition of his achievements. Shi Khai was previously a management consultant at McKinsey, with a focus on digital transformation and analytics across the financial and telecommunications sector across Southeast Asia. Shi Khai holds a Bachelor of Science from Imperial College London.

Raghav Agarwal is an investment analyst at LongHash Ventures. Raghav has previously worked as research analyst at D.E. Shaw and product analyst at Fidelity Investments. Raghav is a computer science engineer and holds a Master in Business Administration from Indian Institute of Management, Shillong. 

We would also like to thank Bo Du and Peter Kim from Polymer Labs, Galen Moore from Axelar Network, Uma Roy from Succinct Labs, Alex Smirnov from deBridge, Max Glassman and Ryan Zarick from LayerZero for reviewing and providing their valuable feedback.

References

[1] https://forum.cosmos.network/t/ibc-security-advisory-dragonberry/7702 

[2] https://polymerlabs.medium.com/the-multi-hop-ibc-upgrade-will-take-ibc-to-ethereum-and-beyond-b4bee43523e 

[3] https://cointelegraph.com/news/wormhole-hack-illustrates-danger-of-defi-cross-chain-bridges 

[4] https://axelar.network/blog/future-proof-interop-path-adaptability-for-cross-chain-dapps 

[5] https://ethresear.ch/t/hashi-a-principled-approach-to-bridges/14725 

[6] https://twitter.com/MultichainOrg/status/1613830754458533888?s=20&t=MoDGESqOdcjMQDMFQqzTyQ

[7] https://axelar.network/blog/axelar-virtual-machine-future-of-interoperability 

[8] https://twitter.com/CelerNetwork/status/1638330932603109379?s=20

[9] https://axelar.network/blog/axelar-implements-quadratic-voting-with-maeve-upgrade  

Further Reading

[a] Navigating Arbitrary Messaging Bridges: A Comparison Framework: https://blog.li.fi/navigating-arbitrary-messaging-bridges-a-comparison-framework-8720f302e2aa 

[b] L2Bridge Risk Framework: https://gov.l2beat.com/t/l2bridge-risk-framework/31 

[c] Horatius at the Bridge

[d] Axelar: https://docs.axelar.dev/

[e] CelerIM: https://im-docs.celer.network/developer/celer-im-overview 

[f] ChainLink CCIP: https://blog.chain.link/introducing-the-cross-chain-interoperability-protocol-ccip/

[g] debridge: https://docs.debridge.finance/  

[h] IBC: https://tutorials.cosmos.network/academy/3-ibc/ 

[i] LayerZero: https://layerzero.gitbook.io/docs/ 

[j] Multichain: https://docs.multichain.org/getting-started/introduction 

[k] Nomad: https://docs.nomad.xyz/nomad-101/introduction 

[l] Polymer Labs: https://polymerlabs.medium.com/ 

[m] Succinct Labs Blog

[n] Wormhole: https://docs.wormhole.com/wormhole/ 

Comments

All Comments

Recommended for you

  • OpenTrade announces $4 million seed extension round led by AlbionVC

    OpenTrade has announced the completion of a $4 million seed extension financing round to build RWA-supported loan and stablecoin yield products. This round of financing was led by AlbionVC, with participation from a16z Crypto and CMCC Global. OpenTrade plans to use the funds to expand its operations and enhance its product capabilities.

  • BNB Chain Ecosystem Re-staking Infrastructure Kernel Receives Investment from Binance Labs

    BNB Chain's ecological re-staking infrastructure Kernel has announced that it has received investment from Binance Labs. As of now, its total financing amount has reached 10 million US dollars, with main investors including: SCB Limited, Laser Digital, Bankless Ventures, Hypersphere, Draper Dragon, DACM, CYPHER, ArkStream Capital, HTX Ventures, Avid VC, GSR, Cluster Capital, Longhash Ventures, Via BTC, Side Door Ventures, NOIA, and DWF Labs. It is reported that Kernel's mainnet is about to be launched. Kelp provides users with support for Ethereum liquidity re-staking services based on rsETH, while Gain provides DeFi, CeDeFi, and RWA income products. KERNEL tokens are designed to unify the governance and incentive mechanisms of Kelp, Kernel, and Gain, while providing rewards for early supporters of ecosystem development.

  • Morgan Stanley: The U.S. dollar will peak before the end of the year and enter a "bear market pattern" in 2025

    Morgan Stanley predicts that the strong US dollar will peak before the end of the year and then enter a "bearish market trend", slowly declining until 2025. The bank believes that due to the Bank of Japan's rate hikes and gradual easing actions by the Reserve Bank of Australia, the potential for the yen and Australian dollar to rise next year is the greatest.

  • Equation News calls out Binance for "insider trading": You are destroying the sentiment of the trading market

    On November 25th, Formula News reported that to those insider traders who participated in the listing of Binance perpetual contracts, please slow down when selling your chips next time. The WHY and CHEEMS crashes you caused resulted in a 100% negative return for everyone involved in the trade, and you are destroying the emotions of the trade. Earlier today, Binance announced the listing of 1000WHYUSDT and 1000CHEEMSUSDT perpetual contracts, which caused a short-term crash in WHY and CHEEMS and sparked intense discussion within the community.

  • U.S. Congressman Mike Flood: Looking forward to working with the next SEC Chairman to revoke the anti-crypto banking policy SAB 121

     US House of Representatives will investigate Representative Mike Flood's recent statement: "Despite widespread opposition, SAB 121 is still operating as a regulation, even though it has never gone through the normal Administrative Procedure Act process." Flood said, "I look forward to working with the next SEC chairman to revoke SAB 121. Whether Chairman Gary Gensler resigns on his own or President Trump fulfills his promise to dismiss Gensler, the new government has an excellent opportunity to usher in a new era after Gensler's departure." He added, "It's not surprising that Gensler opposed the digital asset regulatory framework passed by the House on a bipartisan basis earlier this year. 71 Democrats and House Republicans passed this common-sense framework together. Although the Democratic-led Senate rejected it, it represented a breakthrough moment for cryptocurrency and may provide information for the work of the unified Republican government when the next Congress begins in January next year."

  • Indian billionaire Adani summoned by US SEC to explain position on bribery case

    Indian billionaire Gautam Adani and his nephew, Sahil Adani, have been subpoenaed by the US Securities and Exchange Commission (SEC) to explain allegations of paying over $250 million in bribes to win solar power contracts. According to the Press Trust of India (PTI), the subpoena has been delivered to the Adani family's residence in Ahmedabad, a city in western India, and they have been given 21 days to respond. The notice, issued on November 21 by the Eastern District Court of New York, states that if the Adani family fails to respond on time, a default judgment will be made against them.

  • U.S. Congressman: SEC Commissioner Hester Peirce may become the new acting chairman of the SEC

    US Congressman French Hill revealed at the North American Blockchain Summit (NABS) that Republican SEC Commissioner Hester Peirce is "likely" to become the new acting chair of the US Securities and Exchange Commission (SEC). He noted that current chair Gary Gensler will step down on January 20, 2025, and the Republican Party will take over the SEC, with Peirce expected to succeed him.

  • Tether spokesperson: The relationship with Cantor is purely business, and the claim that Lutnick influenced regulatory actions is pure nonsense

     a spokesperson for Tether stated: "The relationship between Tether and Cantor Fitzgerald is purely a business relationship based on managing reserves. Claims that Howard Lutnick's joining the transition team in some way implies an influence on regulatory actions are baseless."

  • Bitwise CEO warns that ETHW is not suitable for all investors and has high risks and high volatility

    Hunter Horsley, CEO of Bitwise, posted on X platform that he was happy to see capital inflows into Bitwise's Ethereum exchange-traded fund ETHW, iShares, and Fidelity this Friday. He reminded that ETHW is not a registered investment company under the U.S. Investment Company Act of 1940 and therefore is not protected by the law. ETHW is not suitable for all investors due to its high risk and volatility.

  • Web3 data and AI company Validation Cloud completes $10 million in new round of financing

     Web3 data and AI company Validation Cloud announced a $10 million financing round from True Global Ventures. The company plans to use the funds to expand its AI products and achieve seamless access to Web3 data.