// trustless, permissionless cross-chain bridging
From the first day of designing the TRAIN protocol every step we've taken and every design decision we've made has been guided by two fundamental rails:
Trustless
Users should be able to transfer assets between chains without ever losing control of their funds.
Permissionless
Networks should be able to join the protocol without approvals or gatekeepers.
The TRAIN Protocol uses an intent/solver based system secured by Atomic Swaps and Local Verification (e.g. Light Client running inside a browser). This ensures uniform, trustless security across all chains. The architecture allows any network to integrate under the same security framework, enabling infinite scalability.
// all our work is open-source under the MIT license: protocol contracts, bridging dApp, solver agent