|
41 | 41 | "layer-2-expand-use-cases-description": "With higher transactions per second, lower fees, and new technology, projects will expand into new applications with improved user experience.",
|
42 | 42 | "layer-2-how-does-layer-2-work-title": "How does layer 2 work?",
|
43 | 43 | "layer-2-how-does-layer-2-work-1": "As we mentioned above, layer 2 is a collective term for Ethereum scaling solutions that handle transactions off Ethereum layer 1 while still taking advantage of the robust decentralized security of Ethereum layer 1. <strong>A layer 2 is a separate blockchain that extends Ethereum</strong>. How does that work?",
|
44 |
| - "layer-2-how-does-layer-2-work-2": "There are several different types of layer 2, each having their own trade-offs and trust assumptions. Layer 2s take the transactional burden away from the layer 1 allowing it to become less congested, and everything becomes more scalable.", |
| 44 | + "layer-2-how-does-layer-2-work-2": "There are several different types of layer 2, each having their own trade-offs and security models. Layer 2s take the transactional burden away from the layer 1 allowing it to become less congested, and everything becomes more scalable.", |
45 | 45 | "layer-2-rollups-title": "Rollups",
|
46 | 46 | "layer-2-rollups-1": "Rollups bundle (or ’roll up’) hundreds of transactions into a single transaction on layer 1. This distributes the L1 transaction fees across everyone in the rollup, making it cheaper for each user.",
|
47 | 47 | "layer-2-rollups-2": "Rollup transactions get executed off layer 1 but the transaction data is submitted to layer 1. By submitting transaction data onto layer 1, rollups inherit the security of Ethereum. This is because once the data is uploaded to layer 1, reverting a rollup transaction requires reverting Ethereum. There are two different approaches to rollups: optimistic and zero-knowledge - they differ primarily on how this transaction data is submitted to L1.",
|
|
52 | 52 | "layer-2-zk-rollups-description": "Zero-knowledge rollups use validity proofs where transactions are computed off-chain, and then compressed data is supplied to Ethereum Mainnet as a proof of their validity.",
|
53 | 53 | "layer-2-zk-rollups-childSentance": "More on ZK-rollups",
|
54 | 54 | "layer-2-dyor-title": "Do your own research: risks of layer 2",
|
55 |
| - "layer-2-dyor-1": "Many layer 2 projects are relatively young and still have additional trust assumptions as they work to decentralize their networks. Always do your own research to decide if you're comfortable with any risks involved.", |
| 55 | + "layer-2-dyor-1": "Many layer 2 projects are relatively young and still require users to trust some operators to be honest as they work to decentralize their networks. Always do your own research to decide if you're comfortable with any risks involved.", |
56 | 56 | "layer-2-dyor-2": "For more information on the technology, risks, and trust assumptions of layer 2s, we recommend checking out L2BEAT, which provides a comprehensive risk assessment framework of each project.",
|
57 | 57 | "layer-2-dyor-3": "Go to L2BEAT",
|
58 | 58 | "layer-2-use-layer-2-title": "Use layer 2",
|
|
0 commit comments