Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
bitcoins-evolution-defi-ordinals-and-l2s
Blog

Why Bitcoin Sidechains Are Not Permissionless

A technical breakdown of how leading Bitcoin sidechains like Stacks and Rootstock rely on federations and trusted operators, creating central points of failure and violating the core Bitcoin ethos of permissionlessness.

introduction
THE PERMISSIONED ILLUSION

Introduction

Bitcoin sidechains, despite marketing, are not permissionless networks due to their reliance on centralized trust assumptions for security.

Centralized Security Assumptions define all Bitcoin sidechains. Unlike the Bitcoin base layer, which is secured by decentralized proof-of-work, sidechains like Liquid Network and Rootstock (RSK) rely on a federated multi-signature model for moving assets. This federation, often composed of a consortium of companies, holds the keys to the Bitcoin bridge, creating a single point of failure and censorship.

The Bridge is the Chokepoint for permissionlessness. Users must trust the federation's validators to honestly forward their BTC and process withdrawals. This model is fundamentally different from a trust-minimized bridge like a light client, which would verify the Bitcoin chain's proof-of-work directly. The federated peg is a centralized custodian with extra steps.

Counter-Intuitive Reality: A sidechain's internal consensus (e.g., RSK's merged mining) is irrelevant if the bridge is permissioned. The security floor for user assets is the weakest link—the federation—not the Bitcoin hash rate. This makes sidechains more akin to permissioned enterprise blockchains like Hyperledger Fabric than to L2s like Arbitrum or Optimism, which inherit Ethereum's decentralized security.

deep-dive
THE CUSTODIAL REALITY

The Federation Fallacy: How Sidechains Actually Work

Bitcoin sidechains rely on centralized, permissioned federations for security, contradicting their permissionless branding.

Federated multisig is custodial. A federation of trusted signers controls the locked BTC on the mainchain. This creates a centralized security model where users must trust the honesty and availability of these entities, identical to a traditional custodian.

No Nakamoto Consensus exists. Unlike Bitcoin's proof-of-work, sidechains like Liquid Network or Rootstock use a Proof-of-Authority or Proof-of-Stake system. Their validators are the federation members, making the chain's liveness and state correctness permissioned.

The bridge is the bottleneck. The two-way peg mechanism is the single point of failure. Withdrawals require federation approval, creating censorship risk. This architecture mirrors centralized bridges like Multichain or Wormhole's guardian set, not a trustless system.

Evidence: The Liquid Network's federation includes 15 institutional members like Blockstream and CoinShares. Users cannot join or audit this group without permission, making the sidechain's security a function of legal agreements, not cryptography.

THE PERMISSIONLESS ILLUSION

Sidechain Security Model Comparison

A first-principles breakdown of why Bitcoin sidechains fail Nakamoto's decentralization test, comparing their security models to L1 Bitcoin and permissionless L2s.

Security Feature / MetricBitcoin L1 (Base Layer)Federated Sidechain (e.g., Liquid, RSK)Drivechain / Softchain Proposal

Validator Set Control

Open PoW Mining (Permissionless)

Federation of 15-60 Known Entities

Merged Mining (Permissionless in theory)

Withdrawal Finality Guarantor

Bitcoin's 6-block Confirmations

Federation Multi-Sig (m-of-n)

Miner Voting via BIP (Theoretical)

Time to Withdraw to L1

~60 minutes (6 blocks)

~2 minutes to 2 hours (Federation batch)

Voting Period (e.g., 3 months)

Capital Efficiency for Security

$25B in mining hardware securing all value

~$100M - $1B in bonded stakes (federation capital)

Leverages Bitcoin's existing hashpower

Censorship Resistance

True (Hashpower is anonymous & permissionless)

False (Federation can censor transactions)

Theoretically True (Dependent on miner adoption)

Trust Assumption

None (Cryptoeconomic only)

Trust in Federation Honesty & Liveness

Trust in Miner Honesty & Liveness

Settlement Assurance

Absolute (Settles on Bitcoin)

Conditional (Requires federation signatures)

Delayed & Conditional (Requires miner vote)

Active Examples / Protocols

Bitcoin Mainnet

Blockstream Liquid, RSK

None (BIP 300/301 not activated)

counter-argument
THE ARCHITECTURAL FLAW

The Builder's Defense (And Why It Fails)

Sidechain security models rely on centralized or federated bridges, creating a permissioned bottleneck that contradicts Bitcoin's core value proposition.

The security is outsourced. Bitcoin sidechains like Liquid Network and Rootstock (RSK) do not inherit Bitcoin's proof-of-work security. Their security is a separate, weaker system managed by a federation of functionaries. This creates a trusted bridge, not a trustless extension.

The bridge is the bottleneck. Users must trust the federated multisig to custody assets and validate state transitions. This model is identical to Wrapped Bitcoin (WBTC) custodians and fails the permissionless test. The federation acts as a centralized gatekeeper for all cross-chain value.

The defense is semantic. Proponents argue the sidechain itself is permissionless for block production. This ignores the permissioned entry point. The federation's control over the two-way peg makes the entire system conditionally permissionless, a contradiction for a sovereign asset.

Evidence: The Liquid Federation requires approval for new members. RSK relies on a PowPeg guarded by a closed group. This is not the decentralized security that defines Bitcoin's Nakamoto Consensus.

takeaways
THE PERMISSIONED TRAP

Key Takeaways for Architects

Sidechain security models fundamentally break Bitcoin's permissionless promise, creating systemic risk.

01

The Federation is a Centralized Root of Trust

Most sidechains (e.g., Liquid Network, Rootstock) rely on a multi-sig federation to secure asset transfers. This creates a permissioned checkpoint that can censor or freeze funds. The security model reverts to a trusted committee, not Nakamoto Consensus.\n- Security Model: Trusted Federation (e.g., 11-of-15 signers)\n- Failure Mode: Single point of censorship and confiscation\n- Contrast: Bitcoin validators are permissionless; sidechain validators are whitelisted.

~15
Federation Members
0
Permissionless Nodes
02

Two-Way Pegs Require Custodial Bridges

Moving BTC to a sidechain requires locking it in a bridge contract or multi-sig. This creates a centralized liquidity pool vulnerable to exploits (see Ronin Bridge, Wormhole). The bridge operators become de facto custodians of billions in BTC.\n- Architecture: Custodial Bridge with Federated Validators\n- Risk: Bridge is a high-value attack surface for hackers\n- Data: Major bridge hacks have exceeded $2B+ in total losses.

$2B+
Bridge Hack Losses
Custodial
Asset Model
03

Sovereign Security vs. Parasitic Security

Sidechains do not inherit Bitcoin's hashrate. They must bootstrap their own validator set, often leading to low Nakamoto Coefficients and vulnerability to 51% attacks. Security is parasitic on the federation, not sovereign like Bitcoin.\n- Security Source: Independent, often Proof-of-Stake or Federated PoA\n- Attack Cost: Can be as low as thousands of dollars vs. Bitcoin's billions\n- Example: Early sidechains like Liquid have ~15 federated signers; a compromise of 8 can steal all locked BTC.

~$10K
Example Attack Cost
Parasitic
Security Model
04

Drivechains: A Permissionless Proposal (That Doesn't Exist)

Drivechains (BIPs 300/301) propose a miner-voted, permissionless sidechain model. However, they remain theoretical and face significant political and technical hurdles for Bitcoin activation. They highlight the trade-off: true permissionlessness requires deep protocol changes.\n- Mechanism: Bitcoin miners vote on sidechain withdrawals via blind merged mining\n- Status: Not deployed; requires a contentious soft fork\n- Trade-off: Introduces new complexity and miner governance into Bitcoin core.

0
Active Deployments
Theoretical
Current State
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline
Why Bitcoin Sidechains Are Not Permissionless | ChainScore Blog