Shared Security

Shared Security: Collective Network Protection

Shared security allows multiple blockchain applications or chains to benefit from common security infrastructure rather than maintaining separate validator sets. It’s like having a shared security service for multiple buildings.

Shared security refers to security models where multiple blockchain networks or applications are protected by a common set of validators or consensus mechanism. This provides strong security guarantees without requiring each application to bootstrap its own security.

How Shared Security Works

Validator sharing allows multiple chains to be secured by the same set of validators, spreading security costs and increasing efficiency.

Economic security pooling creates stronger security guarantees than individual chains could achieve with smaller validator sets.

Slashing coordination ensures validators face penalties across all chains they secure, aligning incentives for honest behavior.

[IMAGE: Shared security model showing multiple chains protected by common validator set with coordinated slashing]

Real-World Examples

  • Polkadot parachains share security through the relay chain’s validator set
  • Cosmos consumer chains can opt into shared security from the Cosmos Hub
  • Ethereum rollups inherit security from Ethereum’s validator set

Why Beginners Should Care

Security benefits from shared security that provides stronger protection than independent chains with smaller validator sets.

Cost efficiency as applications don’t need to bootstrap their own security or maintain expensive validator infrastructure.

Trade-off understanding between security benefits and potential centralization or dependency risks.

Related Terms: Validator, Consensus Mechanism, Slashing

Back to Crypto Glossary


Similar Posts

  • Intent-Centric Protocols

    Intent-Centric Protocols: What You Want, Not How Intent-centric protocols let users specify desired outcomes while the system figures out how to achieve them. Instead of manually executing swap steps, you just say “I want USDC” and the protocol handles everything. Intent-centric protocols allow users to express desired end states rather than specific transaction sequences. Users…

  • Compound Interest

    Compound Interest: Exponential Growth ReturnsCompound interest is earned on both the initial investment and previously accumulated interest, creating exponential growth over time. It's like planting a tree where each year's growth makes the tree bigger, which then grows even more the following year.Compound interest refers to earning returns not only on the original principal amount…

  • Hardware Wallet

    Hardware Wallet: Your Crypto’s Personal Vault If you’re serious about crypto, you need a hardware wallet. It’s the difference between keeping cash in your wallet versus storing it in a bank vault. A hardware wallet is a physical device that stores your cryptocurrency private keys offline, away from internet hackers. Think of it as a…

  • Storage Rent

    Storage Rent: Pay-per-Use Blockchain StorageStorage rent is a proposed mechanism where users pay ongoing fees for maintaining data on blockchain networks. It's like paying monthly rent for keeping files in cloud storage instead of a one-time purchase.Storage rent refers to fee mechanisms that charge users for ongoing blockchain storage rather than allowing permanent storage after…

  • Price Impact

    Price Impact: Trade Size Effect on Market PricesPrice impact refers to how trading activity affects cryptocurrency prices, particularly when large orders move markets significantly. It's like how jumping into a small pool creates bigger waves than jumping into an ocean.Price impact is the effect that trading activity has on cryptocurrency prices, with larger trades typically…

  • Blockchain

    Blockchain: The Unchangeable Digital Ledger Forget the hype – blockchain is simply a better way to keep records. It’s like a ledger book that everyone can see, but no one can cheat. Blockchain is a chain of digital records (blocks) that are linked together and secured using cryptography. Once information goes into a block, changing…