Skip to main content

How Does a Layer-2 Solution Ensure the Security of Its Off-Chain Data?

Layer-2 solutions inherit the security of the underlying Layer-1 blockchain. Rollups post a compressed version of their transaction data back to Layer-1.

Optimistic Rollups use fraud proofs, relying on honest nodes to challenge invalid states. ZK-Rollups use cryptographic validity proofs, mathematically guaranteeing the integrity of the off-chain state transition before it is finalized on Layer-1.

How Does ‘Data Availability’ Relate to the Security of Both Sharding and Layer 2 Rollups?
How Do “Fraud Proofs” Work and What Are Their Limitations?
What Is a ZK-Rollup and How Does It Achieve Scalability?
What Is the Primary Difference between Optimistic Rollups and ZK-Rollups?