Tuesday, 02 January 2024 12:17 GMT

SEDA's Flagship Verification Module To Secure A $120 Billion Industry


(MENAFN- Chainwire) New York, New York, February 11th, 2025, Chainwire

SEDA has announced the Interoperability Verification Module (IVM) framework to set an industry standard for cross-chain verification for all routes, across any VM.

Today, SEDA announced the first-of-its-kind Interoperability Verification Module framework. SEDA IVMs are a plug-and-play verification solution for interoperability protocols, adding significantly upgraded security, near-instant horizontal scaling, and increased decentralization out of the box. Interoperability providers integrating the SEDA IVM can access a hyper-specialized framework for independent, permissionless verification of any cross-chain transaction across all routes. The SEDA IVM framework is built to serve the modularization of Interoperability architecture necessary to scale from the current landscape of to an by 2026.



The leverages a multi-layer verification process consisting of an independent overlay network, decentralized solvers, and a combination of private and public RPC data providers. With , the SEDA IVM presents a critical piece of industry-needed security infrastructure. Built to offer a robust, scalable, and customizable module, the IVM provides independent decentralized verification for millions of transactions across thousands of networks.

Key features and benefits of the SEDA IVM include:

  • Industry-wide data parity with a singular security zone.
  • Built-in liveness guarantees.
  • Programmable design to suit specific needs of bridge, solver, and abstraction layers.
  • Permissionless access and deployments.

Parallel to a message relayed between chains, the IVM automatically initiates a secure verification sequence, in which a dedicated secret committee of independent overlay nodes is formed to query RPC data on the source chain. Results are returned via a commit-reveal scheme for data integrity and preventing manipulation, after which protocol-defined instructions filter and order results before being batched on SEDA's main chain. Data results are secured with tamper-proof cryptographic guarantees before being relayed by solvers to the destination chain.

The directly addresses recent industry challenges, such as the caused by an offline multi-sig verifier. By plugging into SEDA's distributed verification architecture, interoperability providers inherit security and liveness guarantees associated with SEDA's Network design, consisting of a performant layer one, a highly decentralized overlay network, and a censorship-resistant solver network. This design mitigates collusion risk and downtime commonly associated with default multi-sig relay setups, which secure over

By decoupling verification, interoperability providers can focus on scaling services to thousands of new chains, allowing SEDA to provide specialized verification for all routes.

For more information about SEDA's IVM framework and integration possibilities, users can visit

About SEDA

MENAFN11022025007842016840ID1109195313


Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.