Skip to content
Back to Blog
Fundamentals

The Security Architecture of Rootstock and the Principle of Defense

Read Time: 3 mins
The Security Architecture of Rootstock and the Principle of Defense

In the latest episode of Rootstock Fundamentals, we dive into the network’s security architecture — and explore the defense mechanisms deployed to keep assets safe. To do that, we’re joined by Rootstock’s co-founder and Chief Scientist Sergio Demian Lerner.

A long-standing issue across the industry has been something known as the “blockchain trilemma.” This relates to the notion that security, scalability and decentralization cannot all be achieved at the same time without one suffering as a result.

Sergio explains that this trilemma has been a key consideration for the developers building on Rootstock: “You could argue that Bitcoin is highly secure and highly decentralized but struggles with scalability. I’m simplifying here, but that would be one argument. You could argue that Proof-of-Stake blockchains are highly scalable and can be very decentralized, but there are security challenges around that.” 

 Watch the full episode on YouTube.

Merged Mining – Defense and Profits

By being fully compatible with the Ethereum Virtual Machine, and built as the oldest and biggest Bitcoin sidechain, Rootstock delivers smart contract functionality while being directly secured by BTC miners through an intuitive process called merge mining.

“Having more than 55% of Bitcoin miners mining Rootstock, the amount of hash rate makes it impossible to revert transactions from an outside attack,” he says. “From an inside attack, we have an ad hoc system called Armadillo that monitors any attempt to revert transactions — and is able to alert participants in a decentralized manner to prevent these kinds of attacks.” 

Work is continually underway to increase uptake among Bitcoin miners even further: “There are more proposals by the community to improve the security of the merge mining. It’s come to a point where merge mining is highly secure — and obviously, we want to reach 80%, 90% of BTC hashrate because there is money on the table. It’s money that they can take very easily by like starting merged mining today, which is kind of very, very easy.”

Defense In Depth

A guiding principle of Rootstock’s security is known as “defense in depth“, where multiple precautions are enforced to protect assets and infrastructure. In essence, this means that — even if one safeguard is breached, other measures remain in place to prevent malicious actors from achieving a breach. This is a nod to a Roman military strategy that would cede control to enemies by allowing them into space, only for them to be enveloped in a counterattack. 

PowHSM

The process of ensuring that BTC can be exchanged for RBTC, a smart version of Bitcoin that unlocks access to DeFi platforms, is governed by an autonomous system called PowPeg. Here, third-party operators known as pegnatories run a dedicated node and also have a tamperproof hardware security module called PowHSM. Crucially, no single pegnatory is in control of locked-up Bitcoin — and even if a majority of pegnatories got together in a room, they would still be unable to release funds.

Rate limits

Other layers of protection include a rate limiter that’s designed to safeguard against denial of service attacks, which caps the amount of messages a single account can create. “If you want to spam the Rootstock network it’s very, very hard,” Sergio explains. “As soon as you start pushing transactions into the network, the network resists the attack and slows you down. This is a means for preventing future attacks — maybe a class of attacks that we’re not aware of — but it’s part of defense in depth.”

Fee limits

Another defense mechanism limits the amount of fees that a user can spend when they’re attempting to send a transaction. “One of the things we saw in Ethereum in the beginning was people spending a huge amount of ETH in fees by mistake,” Sergio says. “Sometimes they were able to recover them, sometimes they were not. And one of our first principles is to protect the user as much as we can. It’s not okay to leave the user as a target for attacks. If we can do something in the consensus layer to protect the users against their own mistakes, let’s do it.” 

An advanced Bitcoin bridge

Sergio says RootstockLabs is continually on the lookout for alternative architectures that could be used to create an even more secure and resilient connection with Bitcoin. But after years of experimentation, PowHSM has proven itself to be the best by far.

“It’s the most advanced Bitcoin bridge that exists,” he adds. “PowHSMs provide public attestation to the whole network. There is a page where you can verify for yourself that it’s running the correct version of the firmware. And there’s really no other federated HSM-based system that does that.”

And it’s this infrastructure that helps bring a wave of exciting innovation to Bitcoin: “On top of Rootstock, you have a myriad of new experimental rollups and new systems. State channels, gaming platforms, payment-oriented rollups … whatever you want you can build on top of Rootstock. For me, Rootstock is the root of the tree. That has always been my vision for Rootstock — to be at the center of new ideas and experimentation.”

Put another way, it’s like having your cake and eating it too.  

 

Listen to the full episode of Rootstock Fundamentals with Daniel and Sergio on YouTube — and stay tuned for more interviews coming soon on Spotify.

Recommended articles

Rootstock x Bitcoin: Merged Mining Insights Report Q3 2025

Rootstock x Bitcoin: Merged Mining Insights Report Q3 2025

This report is presented by RootstockLabs, a key contributor to the growth of the Rootstock ecosystem. At Rootstocklabs, we strive to empower the community by offering transparent insights into merged mining dynamics through quarterly hashrate reports dedicated to Rootstock. Our goal is to enhance comprehension with user-friendly visuals such as tables and graphs, ensuring better […]

Ecosystem Updates
Build the Future. On Bitcoin. With Rootstock.

Build the Future. On Bitcoin. With Rootstock.

Bitcoin secures the network; Rootstock brings EVM-compatible smart contracts to it. If you’ve been waiting for the moment to build real apps on Bitcoin and earn while you learn, Builder Rootcamp is where that momentum starts. Join the priority list now What is Builder Rootcamp? Builder Rootcamp is a 10-week, cohort-based, learn and earn program […]

Developer Resources
Reed Network Upgrade: Stronger Bitcoin<>Rootstock Bridging Coming Soon

Reed Network Upgrade: Stronger Bitcoin<>Rootstock Bridging Coming Soon

The Reed Network Upgrade is coming soon, cutting BTC withdrawal costs by 60%, allowing for an increase of PowPeg pegnatories for stronger security, and setting the stage for the Union Bridge, a next-gen, trust-minimized way to move Bitcoin into Rootstock. Check out the Rootstock roadmap to learn more about what’s coming! What is the Reed […]

Ecosystem Updates