Before we dive into why Electron Protocol is "decentralized/trustless". Let us define what we mean by a "trust-less" bridge.
What do we mean by trust-less bridging?
Trustless has following components - Security, Permisionless, Censorship resistant, Non-Custodial
- What do we mean by security?
- Private keys leaking (the bridge operators leak their private keys to the attacker)
- Bugs and implementation errors (this can only be solved over time with battle testing)
- What do we mean by Permission-less and Censorship resistance?
- Can the bridging company restrict developer/protocol activity or their ability to access cross-chain? Can I be denied access?
- What is non-custodial?
- Is the bridge operator company in control of my assets?
Video explainer -
{% embed url="https://www.youtube.com/watch?v=IRHat-LN_vQ" %}