# Findora Bitcoin Bridge ## What is a bridge ? Bridges are applications that help users move assets from one blockchain to another. Bridges can be centralized or decentralized . Blockchain bridges work just like the bridges we know in the physical world. Just as a physical bridge connects two physical locations, a blockchain bridge connects two blockchain ecosystems. Bridges facilitate communication between blockchains through the transfer of information . ## Existing Findora Bridge Findora currently has `Rialto` , which is a decentralized bridge which connects Findora smart chain to to any EVM network. This bridge is safegaurded by `relayers` who are cryptoeconomically incentivised to facilitite these transactions . We currently have a bridge to BSC live on mainnet , with bridges to Ethereum , Fantom and Polygon to be launched in the next quarter . ## Findora Bitcoin Bridge ![](https://i.imgur.com/8s3l0BS.png) ### Bridge Actors ## User This is the end user of the bridge trying to trasfer thier tokens over to findora to utilize findora's native confidential transfers to mask their trasnactions/identities ## Verifiers The bitcoin bridge is secured by a decentralized network of verfiers . Verifiers are incetivised by the system to verify trasnactions on both chains to secure the bridge and prevent atttacks such as double spending . ## Vault Vaults are Multisig Addresses on Bitcoin owned by a group of Verifiers on Findora who control the release of BTC during withdrawal and receive deposits. ## Findora as a settlement layer ![](https://i.imgur.com/askI4lW.jpg) Findora natively proivides privacy on it UTXO ledger . In the future we plan to use findora as a settlement layer for other L1 chains , which can transfer tokens across these bridges to use our anonnymous feaures . #### Why do other L1 chains need privacy Public blockchain networks such as Bitcoin and Ethereum are transparent and offer pseudonymity rather than genuine anonymity. One of the most important design goals is that anyone can join and use the network. But an innate feature of this design is that everyone is able to scrutinize every single transaction recorded in the ledger. Transactions store information about pseudonymous identities (sender and receiver) of the participants in the transaction. They also store information about the amounts being sent. In the case of multi-asset chains, this also entails information about the assets being traded in the transactions. In order to have stronger privacy, confidentiality and censorship-resistance features, it is eminently desirable to mask this information corresponding to a transaction in tandem with cryptographically proving the integrity of the chain.