Layer 2 Security

Architecture

Layer 2 security architecture relies on a combination of cryptographic proofs and economic incentives to ensure the integrity of off-chain computations. Rollups, for example, process transactions off-chain but post compressed data back to the Layer 1, where a fraud proof or validity proof guarantees correctness. This design allows derivatives platforms to handle high transaction throughput while maintaining the security of the base layer.