Root of Trust
The root of trust is the lynchpin of an interoperability protocol's security. As the name suggests, it lies at the heart of the system — any trust assumptions are only as strong as the root of trust itself.
There are two primary components when it comes to Nomad's root of trust security:
- 1.Fraud Detection — Nomad enables Watchers to monitor the system and flag fraud if they detect anything abnormal. Nomad requires only one honest Watcher to maintain liveness to protect the system. This ensures that malicious Updaters are not able to confirm corrupt messages within Nomad.
- 2.App-Governed Root of Trust — Unlike other cross-chain messaging systems that offer monolithic security for all applications, Nomad enables application governance to decide which Watchers they permit to flag fraud and notify their application on-chain.
This section and its associated pages will break down the various components of Nomad's root of trust including:
- How fraud is prevented with the optimistic mechanism
- Why application governed root of trust returns consent to users
- Inherent liveness and economic security assumptions of optimistic verification