Improving Cross-Chain Connectivity: Addressing Challenges and Optimizing the User Experience of Bridges

1. Route Inventory

You can review this Excel sheet: Bridge - Research doc

We can split bridges/message protocols into 4 main families:

A/ Non custodial & decentralized (Trustless):

Pros: TRUSTLESS

Cons: less integration and limited possibilities, unknown to users

B/ Non custodial & decentralized (with Liquidity pools splitsplitted on every connected network for most):