My apologies, I didn't listen to the podcast either. If I did, I might not be able to understand much of it anyway. But with how you present it, notwithstanding the emphasis on the word decentralized, it looks centralized. We've been there, done that. I don't know, but despite highlighting decentralization-- "decentralized use cases", "decentralized bridge", "decentralized exchange"-- it sounds to me exactly like those that came to the market before carrying the same label at the same time maintaining a single point of failure. This sounds like the decentralized finance and decentralized bridges that pestered the market heavily in the past, from which billions and billions were stolen. I hope I'm wrong.
I hope I don't understand wrongly about decentralized finance platforms (DeFi) but in my perspective, they are centralized platforms, not decentralized. Need an example, yes, let's see the Curve finance and Sushi projects had drama in the last bull run. With centralized power on their founders, co-founders, developer team, their projects are actually centralized and shit can happen anytime when those powerful people want to make scam exit, their devices, accounts are compromised.
I hope I am wrong but I don't see how they can be decentralized like Bitcoin.
I don't think we need another later of like decentralized bridge as it makes bitcoin and blockchain more complicated to newbies. And just remember that the design was to used it as a payment method in the first place.
I remember the Ronin bridge was hacked because some of their co-signers' keys were breached. Is Ronin Bridge decentralized when they have only some people who are responsible for signing transactions?
The Ronin Bridge hackHow the Hack Unfolded
According to a postmortem published by Ronin, the theft came as a result of an attacker hacking the “validator nodes”of the Ronin bridge. Funds can be moved out if five of the nine validators approve it. The attacker managed to get hold of the private cryptographic keys belonging to five of the validators, which was enough to steal the cryptoassets. The post mortem claims that “all evidence points to this attack being socially engineered, rather than a technical flaw”.