Skip to main content

Cross-Chain Bridges

Privacy is only useful if you can actually get your assets into the private environment. Nobody wants to be stuck on an island, no matter how beautiful it is. That is why Specter connects to the broader crypto ecosystem through a bridge system built on Hyperlane.

How It Works

The bridge follows a straightforward lock-and-mint model:

  1. Deposit: You lock your tokens in a bridge contract on the source chain (Ethereum, Base, or Arbitrum).
  2. Relay: Bridge relay nodes detect the lock event and relay it to Specter.
  3. Mint: A synthetic g-token is minted on Specter, representing your locked asset 1:1.

Going the other direction works in reverse:

  1. Burn: You burn your g-tokens on Specter.
  2. Relay: The burn event is relayed back to the source chain.
  3. Unlock: Your original tokens are released from the bridge contract.

This is a two-way bridge. Assets flow freely in both directions.

Supported Assets

g-TokenUnderlying AssetSource Chains
gUSDCUSDCEthereum, Base, Arbitrum
gWETHWETHEthereum, Base, Arbitrum
gVIRTUALVIRTUALBase

These g-tokens are GhostERC20 tokens on Specter — privacy-enabled tokens with built-in commit/reveal support and ZK proof compatibility. They can be transferred, traded, and — most importantly — used with Ghost Protocol just like native GHOST tokens. You can Vanish gUSDC to make it private, Summon it later to a different address, and the entire process is indistinguishable from any other Ghost Protocol operation.

Why Hyperlane?

Hyperlane is a modular interoperability protocol that lets us customize the security model for each bridge route. Rather than relying on a single multisig or a centralized relayer, Hyperlane's architecture allows for multiple independent validators to attest to cross-chain messages. This means:

  • No single point of trust. Multiple independent parties must agree that a lock or burn event actually happened before the other side acts on it.
  • Customizable security. Different bridge routes can have different security configurations based on the value at risk and the chains involved.
  • Extensibility. Adding new chains or new assets does not require a protocol upgrade — it is a configuration change.

Privacy Across Chains

Here is where it gets exciting. Once your assets are bridged to Specter as g-tokens, they inherit all of Ghost Protocol's privacy capabilities. You can:

  • Vanish gUSDC on Specter, breaking the link between your Ethereum address and your Specter activity.
  • Summon gWETH to a completely new address that has no on-chain connection to the one that deposited.
  • Create Revels with bridged assets, sharing private data that references cross-chain tokens.
  • Set up Dead Man's Switches with bridged tokens, creating cross-chain contingency plans.

The bridge is the on-ramp. Ghost Protocol is the destination. Together, they mean that your USDC on Ethereum can become fully private on Specter — and when you are done, it can flow back to any address on any supported chain.

Bridge Security

Bridge exploits have been some of the most costly incidents in crypto history, so this is a topic we take seriously. The Hyperlane bridge on Specter is secured by:

  • Multiple independent relay operators who must reach consensus on cross-chain events.
  • On-chain verification of relay messages before any minting or unlocking occurs.
  • Rate limiting and monitoring to detect and contain anomalous bridge activity.

We will publish detailed bridge security audits before mainnet launch. Until then, bridge parameters (including operator sets and rate limits) may be adjusted as the system is hardened.