How Sidechains Work

Sidechains are separate blockchains connected to a main chain via a two-way bridge. They don't inherit main chain security — that's the trade-off. This post explains the mechanism, bridge security models, and why the design distinction matters.
Lewis Jackson
CEO and Founder

Sidechains get lumped in with Layer 2 scaling solutions constantly. They're not the same thing, and the distinction matters — both for understanding how blockchain scaling actually works and for evaluating the security assumptions baked into a given network.

The short version: a sidechain is a separate blockchain that runs alongside a main chain, connected via a two-way bridge. It processes its own transactions, maintains its own state, and only interacts with the main chain when assets move in or out. Unlike a rollup, it doesn't inherit security from the main chain. Unlike a state channel, it's a fully independent network that any user can join.

That independence is both the point and the problem.

How the Mechanism Actually Works

A sidechain is a sovereign blockchain. It has its own consensus mechanism, its own validator set, and its own rule set — which can differ significantly from the main chain it connects to. Polygon PoS (before its migration to AggLayer) ran a proof-of-stake consensus with its own validators, entirely separate from Ethereum's validator set. Liquid Network runs a federated model with a fixed set of functionaries, entirely separate from Bitcoin's mining network.

The connection between a sidechain and its main chain is a two-way peg (sometimes called a 2WP). Here's how a typical asset move looks:

  1. A user sends ETH to a locking contract on Ethereum's main chain. The ETH is now locked — it can't be spent on Ethereum until the bridge releases it.
  2. After the lock is confirmed, the sidechain's bridge mechanism detects the lock and mints an equivalent representation of that ETH on the sidechain.
  3. The user now holds sidechain-ETH. They can transact freely — cheap fees, faster throughput, whatever the sidechain is optimized for.
  4. When they want to return to Ethereum: they burn or lock the sidechain tokens, and after a waiting period or verification process, the Ethereum bridge releases the original ETH.

The key phrase in step 2 is "bridge mechanism detects." How detection and verification work depends entirely on the bridge's design — and that's where most of the risk lives.

There are three common bridge architectures. Federated multisig bridges (used by Liquid, and historically by many EVM sidechains) rely on a fixed set of trusted parties to co-sign bridge transactions. Security model: trust the federation. If a threshold of federation members collude or get compromised, funds can be stolen. External validation bridges use a separate validator set — distinct from both main chain and sidechain — to attest to bridge events. You're trusting a third network. Optimistic bridges apply fraud proofs and challenge periods, similar to optimistic rollups, but without anchoring state data to the main chain.

None of these is as secure as a validity proof anchored to Ethereum. That's a fact of the design, not a criticism — it's the trade-off being made.

Where the Constraints Live

The core constraint: a sidechain's security does not come from the main chain. A validator set of 100 nodes is far more attackable than Ethereum's 400,000+ validators or Bitcoin's global hash rate. If you can corrupt the validators, you can corrupt the chain. The bridge then becomes the primary attack surface — not the sidechain itself necessarily, but the mechanism that moves value between chains.

This isn't theoretical. Ronin Network (the sidechain used by Axie Infinity) was compromised in March 2022 when attackers gained control of five of nine validator keys, draining $625 million. The Ronin bridge used a federated multisig model. The sidechain itself kept running. But the bridge — where the actual value was held — failed completely.

That said, the constraints on rollups don't apply here in the same way. No state data availability requirement, no proof generation latency, no dependence on L1 throughput. Sidechains can finalize transactions quickly with no challenge period and no ZK proof requirement. For use cases where speed and low cost matter more than trustless security — gaming, certain payment applications, enterprise chains — the trade-off can be rational. It's worth being clear about that.

What's Changing

The landscape has shifted significantly since 2020–2021, when EVM sidechains like Polygon PoS were the dominant scaling narrative. The arrival of ZK rollups with cheap per-transaction costs — zkSync Era, Starknet, Scroll — has made the security trade-off harder to justify for general-purpose DeFi. Rollups inherit Ethereum's security. Sidechains don't. As ZK proof generation has gotten cheaper and faster, the gap between sidechain UX and rollup UX has narrowed considerably.

Polygon's own trajectory illustrates the shift. Polygon PoS is being migrated toward zkEVM architecture under the AggLayer framework, moving from federated bridge security toward ZK-proof-based verification. That's a recognition that the original sidechain model had structural limitations worth fixing.

Bitcoin's sidechain landscape looks different. Rollups on Bitcoin are early and technically constrained — Bitcoin's scripting is not Turing-complete. Liquid Network remains active, primarily for institutional traders using it for confidential transactions and fast settlement. Rootstock operates a federated merge-mined sidechain with smart contract capabilities, used primarily in Latin American markets for DeFi without Ethereum exposure. Neither has achieved mass adoption, but the Bitcoin design space is genuinely more constrained than Ethereum's, and meaningful scaling alternatives are limited.

What Would Confirm This Direction

Sustained TVL growth on ZK-secured bridges, as they displace federated multisig designs, would confirm the thesis that the market is pricing in the security difference. Polygon AggLayer achieving significant and growing TVL under its ZK verification layer is the most concrete near-term signal. Reduction in bridge exploit volume over a multi-year window as ZK adoption grows is the systemic confirmation.

What Would Break or Invalidate It

Another large-scale federated bridge compromise — Ronin-style, on a design assumed to be more robust — would reinforce the structural problem without resolving it. ZK proof systems found to have critical vulnerabilities under production load would close the gap between "ZK is better" and "nothing is safe." And if rollup fees drop to near-zero, the last cost advantage sidechains hold over L2s disappears, which doesn't break the thesis so much as accelerate the migration away from sidechain models entirely.

Timing Perspective

Now: Sidechain bridges remain a live exploit surface. If you're moving significant value across a two-way peg, understanding the bridge model — federated, external validator, or optimistic — is table stakes, not optional reading.

Next: Polygon AggLayer's ZK migration is the most consequential test of whether a major sidechain can upgrade its security model without losing its ecosystem.

Later: Bitcoin smart contract sidechains (via BitVM-based constructions and related efforts) may become more meaningful if Bitcoin Layer 2 activity accelerates. The tooling is early and the timeline is uncertain.

Boundary Statement

This explanation covers how sidechains work as a mechanism and where their security assumptions differ from rollups. It doesn't address the tax treatment of bridge transactions, the regulatory classification of sidechain tokens in any jurisdiction, or whether any particular sidechain is a sound deployment target.

Sidechains aren't simply "worse rollups." They're a specific design with specific trade-offs that are well understood. Whether those trade-offs are acceptable depends on what you're building and what you're willing to trust.

Related Posts

See All
Crypto Research
New XRP-Focused Research Defining the “Velocity Threshold” for Global Settlement and Liquidity
A lot of people looking at my recent research have asked the same question: “Surely Ripple already understands all of this. So what does that mean for XRP?” That question is completely valid — and it turns out it’s the right question to ask. This research breaks down why XRP is unlikely to be the internal settlement asset of CBDC shared ledgers or unified bank platforms, and why that doesn’t mean XRP is irrelevant. Instead, it explains where XRP realistically fits in the system banks are actually building: at the seams, where different rulebooks, platforms, and networks still need to connect. Using liquidity math, system design, and real-world settlement mechanics, this piece explains: why most value settles inside venues, not through bridges why XRP’s role is narrower but more precise than most narratives suggest how velocity (refresh interval) determines whether XRP creates scarcity or just throughput and why Ripple’s strategy makes more sense once you stop assuming XRP must be “the core of everything” This isn’t a bullish or bearish take — it’s a structural one. If you want to understand XRP beyond hype and price targets, this is the question you need to grapple with.
Read Now
Crypto Research
The Jackson Liquidity Framework - Announcement
Lewis Jackson Ventures announces the release of the Jackson Liquidity Framework — the first quantitative, regulator-aligned model for liquidity sizing in AMM-based settlement systems, CBDC corridors, and tokenised financial infrastructures. Developed using advanced stochastic simulations and grounded in Basel III and PFMI principles, the framework provides a missing methodology for determining how much liquidity prefunded AMM pools actually require under real-world flow conditions.
Read Now
Crypto Research
Banks, Stablecoins, and Tokenized Assets
In Episode 011 of The Macro, crypto analyst Lewis Jackson unpacks a pivotal week in global finance — one marked by record growth in tokenized assets, expanding stablecoin adoption across emerging markets, and major institutions deepening their blockchain commitments. This research brief summarises Jackson’s key findings, from tokenized deposits to institutional RWA chains and AI-driven compliance, and explains how these developments signal a maturing, multi-rail settlement architecture spanning Ethereum, XRPL, stablecoin networks, and new interoperability layers.Taken together, this episode marks a structural shift toward programmable finance, instant settlement, and tokenized real-world assets at global scale.
Read Now

Related Posts

See All
No items found.
Lewsletter

Weekly notes on what I’m seeing

A personal letter I send straight to your inbox —reflections on crypto, wealth, time and life.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.