Skip to main content




  1. Is there a token for Sygma?
    There are no plans for a Sygma token. Please be aware of scams and impersonators that suggest otherwise.

  2. Where can I find help if I have further questions?
    You can join the Sygma Discord and ask in any support-related channels. Sygma engineers are generally very responsive to technical queries, and someone will usually be on-call to answer more general questions.

  3. Do you have any live integrations?
    Sygma is live on Phala's SubBridge, allowing native token transfers between Ethereum's Mainnet and Phala/Khala. Additionally, with Polkadot's capability for Cross-Consensus Messaging (XCM) between parachains, users can bridge in and out of Astar Network.

  4. How can I make contributions to Sygma? You can submit an application to Sygma's Contributor Program or Builder Program for medium-to-large effort contributions.

    Sygma is eager for developers to jump into the GitHub and help test the code and submit issues.

    Sygma invites engaged participants with high initiative to begin making smaller contributions, whether that's to the Discord, to the documentation or by creating content. Make sure to check out the Contribute page for contributions related to Sygma's documentation.


  1. Is my ecosystem/blockchain/token supported?
    Sygma is currently built to support EVM and Substrate-based chains. The Solidity contracts and custom-built pallets can be adapted to most ecosystems built in these environments, whether that's mainnet Ethereum, an EVM L2, a Polkadot/Kusama parachain, or a standalone Substrate chain.

    If your ecosystem/blockchain/token is not supported (e.g. Tendermint), support could be provided in the near-future. It depends on engineering resources and network demand. If you would like to move ahead with an engineering/product consultation, please reach out to [email protected].

  2. Can I add my own networks/tokens?
    The addition of new networks and tokens to the Sygma protocol is currently a permissioned process that must go through [email protected]. Engineering is already well underway to enable permissionless additions of networks and tokens by the end of 2023.

  3. Can you build an integration for my project?
    It depends. Please take a look at the documentation for Adding A New Token and Adding A New Network and reach out to [email protected] when you or your team is ready.


  1. Is the Sygma protocol decentralized?
    In its current state, the Sygma protocol operates under a trusted federation bridging model using a set of off-chain relayers. Research and engineering is already well underway to enable a decentralized and trustless Sygma bridging protocol, which includes governance of the respective governance controls.

  2. Who are the relayers and what do they do?
    The Sygma protocol relies on a network of trusted off-chain operators that listen for events on a source chain, and "relay" these events to a destination chain through a cryptographic primitive called secure multi-party computation. You can find a list of Sygma's relaying partners in Becoming A Relayer Partner.

  3. Can I become a relayer for Sygma? Sygma is currently looking for credible entities that can meet the acceptance criteria for becoming a relayer. Please see Becoming A Relayer Partner for more information.

  1. What happens when a relayer entity drops off? This would be handled by Sygma's "key reshare" sub-protocol. The "Key Reshare" mechanism allows parties from the old set to rotate key shares with new participants without changing the underlying public/private key. This is useful for onboarding new members into the signing committee, recalibrating threshold requirements, and more importantly preventing hackers from corrupting parties one after another, potentially in the course of many sessions (known as proactive adversaries).

  2. What are the mechanisms for token bridging? Are bridged tokens wrapped or synthetic assets?
    Depending on the integration of the specific token route, bridged tokens will follow either a lock/release (1:1 backed, wrapped asset) mechanism or a burn/mint (synthetic asset) mechanism.

  3. How is Sygma currently secured?
    The Sygma protocol currently uses secure multi-party computation (MPC) and threshold signature schemes (TSS) to strengthen security and communication within the relayer network. Furthermore, there is ongoing efforts underway to implement optimistic, trust-minimized cross-chain block header oracles (see Introducing Zipline Casper), as well as a ZK-based block header oracle to provide tailored security for different bridging use-cases.