How Does a Layer-2 Solution Ensure the Security of Its Off-Chain Data?
Layer-2 solutions inherit the security of the underlying Layer-1 blockchain. Rollups post a compressed version of their transaction data back to Layer-1.
Optimistic Rollups use fraud proofs, relying on honest nodes to challenge invalid states. ZK-Rollups use cryptographic validity proofs, mathematically guaranteeing the integrity of the off-chain state transition before it is finalized on Layer-1.