How are L2 bridges more secure than cross chain bridges?
I’ve been seeing this claim so just wanna learn more. We all know cross chain bridges get hacked and exploited constantly, with the most recent one being Nomad (seems to be a software/code problem this time as opposed to a 51% attack problem?), so just wondering how does security with L2 bridges work?
submitted by /u/ericla1014
[link] [comments]