Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
  79. 79. Typical vulnerabilities and bridge security in blockchain technology
  80. 80. JumpNet - Ethereum's new sidechain
Lesson 26 of 80
In Progress

26. Interchain Security – new Cosmos (ATOM) protocol

Informal Systems, is a development company that deals with the construction of Cosmos. It has created a model of shared security that will be added to the Cosmos ecosystem. It ensures the security of the blockchain technology ecosystem, and also makes the process of launching the blockchain itself easier and more accessible to the user. Interchain Security – that’s what we’re talking about. How does it work and what impact will it have on the Cosmos network? This is the topic of our lesson today.

Interchain Security from Cosmos (ATOM) – what is it?

From our previous lessons, you know that the Proof-of-Stake (PoS) network is a space revolution blockchain. It enabled all users to secure the network with a token, not a hash factor. We wrote about the variants of the consensus and its most important aspects here.

However, small blockchain PoS networks have low market capital and very few resources. In addition, a low number of stakers, low staking value – these are the factors that make the network more vulnerable to attacks. As a result, this affects its low position on the market.

What does that have to do with Interchain Security? The entire Cosmos ecosystem was built to be the“internet of blockchains”. It is designed to facilitate the creation of connected and interoperable networks.

They are all to be built on the same infrastructure. Next Cosmos Hub shares security with other blockchains by lending them its capital, which is used to validate blocks on smaller chains. As you know, blockchain networks adopt different types of shared security: rollups, zk-rollups or sharding. Interchain Security falls into this category, but it is shared security, built using the Inter-Blockchain Communication Protocol (IBC).

How does Interchain Security work?

Interchain Security allows Cosmos Hub to be responsible for the production of blocks for the consumer chain. How is it done? By allowing validators to run as many as two nodes – for Cosmos Hub and the consumer chain. For the latter blockchain, validators are required to pack the system’s native tokens – ATOM Then all evidence of downtime in the consumer chain is sent to the supplier chain, where staking tokens can be destroyed.

It is also used here protocol Inter Blockchain (IBC). It is responsible for communicating the consumer chain with Cosmos Hub and tracking which validators are actively participating in Interchain Security and reporting absolutely all downtime.

Fun fact: Interchain Security was referred to by other terms: Shared Security, Cross Chain Validation, Cross Chain Collaterization, Shared Staking, Interchain Staking. So don’t be surprised if you come across a different nomenclature in the backstage of crypto.

Why is Interchain Security so important?

This is the most essential update for the Cosmos ecosystem. What do we gain?

  • Thanks to Interchain Security, it will be possible to increase network security, as well as to connect different groups of users and reduce conflicts between them.
  • It will increase platform performance by running Practical Hub Minimalism. (The Cosmos Hub philosophy, whose belief is that Cosmos should have as few functions as possible).
  • Interchain Security allows each of the newly added functions to the ecosystem to become a separate chain. They will then be programmed; will have their tokens and fees. This will encourage validators to actively participate in these chains.
  • The update will also allow Cosmos Hub to combine value ATOM socks with its consumer chains.
  • What’s more, Interchain Security allows Cosmos to remain true to its philosophy of sovereignty. According to the developers, it will enable blockchain economic, not political integration.

Roadmap Interchain Security

We cannot leave it without comment. She is very ambitious and demanding. According to her prediction, security Interchain in the near future will be common in all zones. Of course, assuming that these zones meet the threshold of common validators. Then it will also be possible to implement a new form of consensus. And thus, a new string property will appear: synchronous inter-string communication.


The new update for the Cosmos Ecosystem brings with it many possibilities. Looking at the above-mentioned roadmap, we can see that the developers have an ambitious plan. We look forward to more.