Explore the evolution of cross-chain bridge technology, from risky lock-and-mint models to secure trust-minimized protocols and programmable interoperability.