Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
bitcoins-evolution-defi-ordinals-and-l2s
Blog

Why Bitcoin Bridges Are Not Permissionless

A technical analysis of the inherent constraints in Bitcoin bridge design, demonstrating why current solutions rely on trusted operators and cannot achieve the permissionless ideal of Ethereum's native DeFi.

introduction
THE CUSTODIAN PROBLEM

The Permissionless Illusion

Bitcoin bridges rely on centralized, permissioned validators, creating a fundamental security mismatch with the underlying asset.

Custodial control is the default. Most Bitcoin bridges, like Wrapped Bitcoin (WBTC) and Multichain, require users to trust a centralized entity to hold the BTC. This reintroduces the exact counterparty risk that Bitcoin's proof-of-work consensus was designed to eliminate.

Federated models dominate. Even 'decentralized' bridges like Threshold Network (tBTC) or Ren Protocol operate with a permissioned set of signers. The validator set is not open for anyone to join, creating a permissioned bottleneck for a permissionless asset.

Security mismatch is structural. The 9-signer federation for tBTC or the multisig council for a cross-chain protocol like LayerZero cannot match the economic security of Bitcoin's 1 million+ mining nodes. This creates a fragile, attackable layer.

Evidence: The collapse of the Multichain bridge, which held over $1.5B in assets, demonstrated the catastrophic failure mode of opaque, permissioned validator control. The bridge's security was a function of corporate integrity, not cryptographic proof.

deep-dive
THE BITCOIN CONSTRAINT

Architectural Incompatibility: Why Native Trustlessness Fails

Bitcoin's design prevents the creation of permissionless, trust-minimized bridges without introducing external trust assumptions.

Bitcoin lacks programmability. Its scripting language is intentionally limited, preventing the deployment of smart contracts that could autonomously verify state or custody assets. This forces bridges like Wrapped Bitcoin (WBTC) and tBTC to rely on centralized, permissioned federations or multi-signature schemes for custody and minting logic.

Native verification is impossible. Permissionless bridges on Ethereum or Solana use light clients or fraud proofs to verify the origin chain's state. Bitcoin's consensus mechanism and block structure make this computationally prohibitive, forcing projects like Stacks or Rootstock to use federated notaries or merge-mining, which reintroduce trust.

The security model is inverted. A truly trustless bridge anchors its security to the underlying chain. On Bitcoin, the bridge's security becomes the weakest link—the federation or custodian. This creates a systemic risk vector, as seen in the collapse of cross-chain protocols that over-leveraged wrapped assets.

Evidence: The $15.5B WBTC market cap is secured by a 9-of-15 multisig controlled by BitGo and partners. The most 'decentralized' alternative, tBTC v2, still requires a 100-of-250 operator set for its threshold ECDSA scheme, a trust model orders of magnitude weaker than Bitcoin's 10,000+ nodes.

WHY BITCOIN BRIDGES ARE NOT PERMISSIONLESS

Bridge Trust Matrix: A Spectrum of Centralization

A comparison of trust models for bridging Bitcoin to other chains, highlighting the inherent permissioned nature of each design.

Trust & Security ModelFederated / MPC (e.g., WBTC, tBTC)Light Client / ZK (e.g., Babylon, Botanix)Wrapped / Custodial (e.g., wBTC, hBTC)

Validator Set Size

3-10 entities

Permissionless (theoretically)

1 entity

Validator Selection

Permissioned Consortium

Permissionless Staking

Single Corporate Custodian

Bitcoin Custody Model

Multi-Sig / MPC Wallet

Native Bitcoin (Locked in Script)

Single Custody Wallet

Slashing for Misbehavior

Withdrawal Censorship Risk

Medium (Consortium Vote)

Low (ZK Proof Verification)

High (Single Point of Control)

Bridge Shutdown Risk

High (Admin Keys)

Low (Code is Law)

High (Custodian Decision)

Time to Finality on Destination Chain

~1 hour

~6 Bitcoin blocks (~1 hour)

~1 hour

Native Bitcoin Security Inheritance

counter-argument
THE TRUST TRAP

Steelman: Aren't ZK-Rollups or BitVM the Solution?

Proposed scaling solutions for Bitcoin introduce new trust assumptions that break permissionless composability.

ZK-Rollups require a trusted operator. A ZK-rollup on Bitcoin needs a centralized proposer to batch and order transactions before generating a proof. This creates a single point of failure and censorship, unlike Ethereum rollups where decentralized sequencer sets are emerging.

BitVM is a two-party challenge system. It enables complex computation off-chain but requires at least one honest participant in a 1-of-N trust model. This is not permissionless; it's a federated security model that scales poorly with participant count.

The bridge remains the bottleneck. Whether via a ZK-rollup's operator or a BitVM federation, moving assets to another chain requires a trusted custodian or multisig. This is identical to the security model of existing bridges like Multichain or Wormhole before their native token governance.

Evidence: The only functional Bitcoin L2, Rootstock, uses a federated peg with a 15-of-30 multisig. This demonstrates the current practical limit for Bitcoin-native scaling without altering its base-layer consensus.

protocol-spotlight
THE TRUST TRADE-OFF

Case Studies in Compromise

Bitcoin bridges sacrifice decentralization at the altar of security and finality, creating permissioned chokepoints.

01

The Wrapped Bitcoin (WBTC) Custodian Model

The dominant bridge with $10B+ TVL is a centralized mint/burn operation. It's not a protocol but a legal agreement with BitGo.

  • Problem: Users must KYC with merchants, trusting them not to freeze or confiscate tokens.
  • Solution: Offers perfect asset parity and deep liquidity by mirroring Bitcoin's security model off-chain.
  • Compromise: Introduces counterparty risk and regulatory attack vectors, the antithesis of permissionless design.
>99%
Market Share
1
Custodian
02

The Federated Multi-Sig (e.g., RSK, Stacks)

Sidechains and Layer 2s use a federation of trusted entities to secure the bridge. This is the model for RSK and Stacks.

  • Problem: A super-majority of signers can collude to steal funds or halt withdrawals.
  • Solution: Enables Turing-complete smart contracts on Bitcoin with faster finality and lower fees.
  • Compromise: Security is not Bitcoin's security; it's the security of the federation, creating a permissioned validator set.
4-10
Federation Size
~2-4 hrs
Withdrawal Time
03

The Light Client & SPV Challenge (e.g., Babylon)

Projects like Babylon aim for a trust-minimized bridge by staking Bitcoin directly to secure other chains. This is the frontier.

  • Problem: Bitcoin script is not Turing-complete, making complex verification (fraud proofs, slashing) impossible on-chain.
  • Solution: Leverages Bitcoin's native staking for crypto-economic security, moving closer to permissionless.
  • Compromise: Requires modifications to Bitcoin consensus (covenants, OP_CAT) or complex off-chain watcher networks, which remain unproven at scale.
Theoretical
TVL Scale
L1 Upgrade
Dependency
takeaways
THE PERMISSIONED GATEKEEPERS

TL;DR for Builders and Investors

Bitcoin bridges are not the trustless, decentralized infrastructure you think they are. Here's the structural reality.

01

The Federation Fallacy

Most bridges like Wrapped Bitcoin (WBTC) and Liquid Network rely on a permissioned set of ~15-30 known entities to custody BTC and mint tokens.

  • Single Point of Failure: Collusion or regulatory action against the federation can freeze or seize funds.
  • Censorship Risk: The federation can blacklist addresses, violating crypto's core ethos.
  • Audit Dependency: You must trust periodic attestations, not cryptographic proofs.
~30
Federation Size
100%
Custodial Risk
02

The Multi-Sig Mirage

Projects touting 'decentralized' multi-sig (e.g., tBTC v1, early RenVM) fail the permissionless test.

  • Gatekeeper Selection: The signer set is chosen by a foundation or DAO, not an open protocol.
  • Staking Centralization: Bond requirements often lead to professional node operators dominating, recreating oligopolies.
  • Liveness Assumption: Requires a supermajority of honest, online signers—a social, not cryptographic, guarantee.
5/8
Typical Threshold
Oligopoly
Node Control
03

The Data Availability Blind Spot

Even 'advanced' bridges using Bitcoin SPVs or light clients (e.g., some Cosmos IBC implementations) are not fully permissionless.

  • Bootstrapping Trust: Users must trust a provider for the initial block header or light client state.
  • Relayer Incentives: A permissionless relayer network is often theoretical; in practice, a few incentivized nodes do the work.
  • Sovereign Risk: The connecting chain's validators can censor bridge messages, acting as the ultimate gatekeepers.
1
Trusted Header
Protocol Risk
Added Layer
04

The Economic Capture Problem

Bridge security is gated by capital requirements, not open participation.

  • Validator Bonding: High staking minimums (e.g., 32+ BTC) exclude the average user, centralizing economic power.
  • MEV & Sequencing: Bridge operators control transaction ordering, extracting value in ways users cannot permissionlessly audit.
  • Fee Market Control: The bridging entity sets fees, creating a rent-extractive tollbooth on a supposedly neutral rail.
32+ BTC
Typical Bond
Tollbooth
Fee Model
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline
Why Bitcoin Bridges Are Not Permissionless | ChainScore Blog