LayerZero is an immutable, permissionless, and censorship-resistant protocol to connect blockchains.
Stitching the advantages of blockchains together such that the users of applications do not care about the chains underneath is what will truly make the “crypto” industry worthy of the “Web3” moniker. However, this is a very difficult problem to solve, as evidenced by the multitude of bridge hacks.
Solution Statement: LayerZero
LayerZero was created as an immutable, permissionless, and censorship-resistant protocol to connect blockchains.
LayerZero enables developers to create and configure unified applications, tokens, and data primitives, regardless of chain.
This concept of unified cross-chain development is encapsulated in the word “omnichain” and is what LayerZero envisions the future of crypto moving towards.
Like TCP/IP standardized internet development, LayerZero’s goal is to standardize application development across all chains.
Permissionless. Censorship Resistant. Immutable.
Crypto is a space built to be permissionless, to allow anyone to interact with financial applications. Crypto should be censorship-resistant, to facilitate the movement of data packets without judgement. Crypto aims to exist forever, to make systems immutable and provable, unchanging.
LayerZero’s design mirrors these core principles:
Permissionless: Anyone may run the systems necessary to verify and execute messages. Anyone can build and interact with LayerZero.
Censorship-Resistant: Messages are verified in order and can be configured to execute in order too.
Immutable: Endpoints on each chain exist in the form of smart contracts. These are non-upgradeable and cannot be changed by any party, providing a safe and predictable interface to interact with.
LayerZero sits at the transport layer of the blockchain economy, whereas other “cross-chain” solutions battle for the right to verify messages.
This means LayerZero can act as a quasi-aggregator of verification methods. Any type of verification method – be it bridge, oracle, or attestation service – can be used as a Decentralized Verifier Network (DVN). Application owners building on LayerZero may choose and combine DVNs based on their project’s security needs.
At launch, teams like Google Cloud, Polyhedra, Tapioca, Animoca, LayerZero Labs, and Blockdaemon will be running independent DVNs. In addition to those entities, “adapters” for third-party bridges like CCIP and Axelar are available. This design is the antithesis of vendor lock-in, as it gives developers the ability to choose, modify, and combine different types of verification methods.