🎉 Gate Square Growth Points Summer Lucky Draw Round 1️⃣ 2️⃣ Is Live!
🎁 Prize pool over $10,000! Win Huawei Mate Tri-fold Phone, F1 Red Bull Racing Car Model, exclusive Gate merch, popular tokens & more!
Try your luck now 👉 https://www.gate.com/activities/pointprize?now_period=12
How to earn Growth Points fast?
1️⃣ Go to [Square], tap the icon next to your avatar to enter [Community Center]
2️⃣ Complete daily tasks like posting, commenting, liking, and chatting to earn points
100% chance to win — prizes guaranteed! Come and draw now!
Event ends: August 9, 16:00 UTC
More details: https://www
20,000 words: The Rollups Security Debate
Originally written by Jon Charbonneau Compiled by Frank, Foresight News
Introduction
Like it or hate it, Twitter will probably never stop arguing about whether "L2" or Rollup is "inherit security."
While most debates are indiscernible semantic battles, if you manage to narrow down the argument, the underlying points are valuable because they touch on the core questions of when, where, and why Rollup makes sense.
Does scalable L2 eliminate the need for L1 in the market? Is it possible to turn an L1 like Solana into an L2?
These debates mainly boil down to security issues. Unfortunately, the definition of "security" here has always been very elusive. We usually use this term casually, and most people know roughly what we're talking about, but not completely. Here we will break down security in detail across different architectures.
Buzzword definition
Rollup
I previously used the following definition of Mustafa: "Rollup is a blockchain that publishes its blocks to another blockchain and inherits the consensus and data availability (DA) of that blockchain".
The following is a more general definition given by James Prestwich: "Rollup is a way to opt in to another consensus mechanism by customizing state transition functions, and preserving superset state."
Neither requires a verification bridge, and the ability to build cross-chain bridges with minimal trust assumptions is a major benefit of Rollup, but analyzing them separately is crucial.
We can consider the following rollup criteria:
The Rollup node determines the state of the Rollup on the main chain consensus result (such as the main chain confirming the ordering and availability of data blocks) by applying its own state transition function (STF).
Cross-chain bridge
A cross-chain bridge is a system that allows two blockchains to communicate with each other. Chain A (the target chain) needs to be confident that something has happened on chain B (the source chain) and vice versa. Ideally, we want this communication to be bidirectional, with strongly correlated security attributes (e.g. high confidence that the message is valid, the source chain will not be undone, etc.).
Fundamentally, the cross-chain bridge acts as an "observer" of another blockchain (just like any other typical human user). The cross-chain bridge implements a given confirmation rule by which it is convinced of the state of the connected chain (for example, how many Ethereum blocks must pass to accept transfer inputs).
Bridging from the main chain → Rollup
This direction is very simple, as the Rollup node fully verifies the main chain.
Rollup nodes know everything that happens on the main chain, so they know when cross-chain bridged transactions occur, and the current Ethereum Rollup full node must also run the full node for the Ethereum base layer itself.
Note that Rollup nodes can also run a full validator light node of their main chain instead, if supported. Let's consider a hypothetical example where Ethereum has fully implemented the following upgrades:
Now, assuming you want to run a full node for an Ethereum-based rollup, to follow a valid rollup chain, you must understand Ethereum's canonical chain, which requires checking the consensus and validity of Ethereum itself:
Rollup nodes must check the state validity and DA of Ethereum's own execution layer, as these are the validity conditions for Ethereum blocks. The Rollup node needs to know that it not only tracks Ethereum where consensus has been signed, but also that it is a valid block header. For example, they may accidentally track Ethereum blocks that are consensus signed but invalid (e.g. it generates a lot of ETH).
If the underlying execution layer itself publishes its data to the DA layer (just like other rollups) and adds validity or proof of failure, then it becomes a built-in rollup.
Bridge from the Rollup → main chain
This direction is tricky, because the main chain does not know the state of Rollup and STF by default (i.e. Ethereum nodes do not need to run Rollup nodes). In order for the main chain to believe in the state of the rollup, you can implement the logic of the rollup in the smart contract deployed on the main chain (i.e. the verification bridge contract of the rollup). This smart contract checks the validity of the DA and Rollup states.
Again, this cross-chain bridge is optional. Smart contracts on the main chain are used to convince all main chain nodes of the validity of Rollup, which allows two-way communication under good trust assumptions.
Rollups, Co-processors, and Intents
As discussed, Rollups save some of their own state (Rollup's state) in addition to owning the state of their main chain (e.g. Ethereum). So, does CoW Swap have its own state that is not part of the Ethereum state? If yes, then it sounds like a rollup. If not, then it could be a "co-processor."
However, even this question is not as simple as it seems:
Instead, you might think that the distinguishing factor is the persistence of the state:
If CoW Swap allows specific participants to provide users with fast pre-confirmations (faster than Ethereum's block time) and promises orders that include batches — since Ethereum batch processing takes longer than most users would like, is it now a rollup?
Chris Goes touched on this topic in his talk at the Modularity Summit, beginning with an approximate definition of intents: "the commitment of a preference function for a given system state space."
Note the similarities between partial resolution (match intent) and rollup sorting. The operator obtains the user's off-chain signed message → publishes the resulting data to the main chain.
Intent-centric architectures and Rollup-centric architectures achieve similar goals from opposite directions. Intent-centric approach addresses this problem broadly from the perspective of users and applications, and Rollup-centric approach addresses this problem broadly from the perspective of different blockchains.
Here, it is not important to set specific distinguishing boundaries. What's more, we found that Rollup is actually not much different from the apps we've become accustomed to with off-chain intent matching!
You rely on off-chain participants (sequencers vs. solvers/fillers, etc.) to get some weaker guarantees, such as providing the best execution and a good user experience → determining the outcome based on the data published to the main chain. However, they do not hold your funds in custody.
As verifiable off-chain computation becomes more important, the lines between the two can become blurred:
If you want the intent solver or rollup orderer to be less trusted...
Modular blockchain and monolithic blockchain
Monolithic blockchains (aka integrated blockchains) are often defined as chains that vertically integrate all core functions, i.e., consensus, DA, and execution. They take full responsibility for their own safety, and Solana and Cosmos Hub are prime examples.
DA layers (such as Ethereum and Celestia) are often referred to as "modular" blockchains because they outsource execution to Rollup, but this is not entirely accurate. They are also independently responsible for their own consensus, DA, and enforcement.
Even the execution of Celestia will be limited (e.g., transfers, staking, cross-chain). Similarly, if someone starts Rollup on top of Solana, it won't magically become a "modular" blockchain.
So when you hear people refer to chains like Ethereum or Celestia as "modular" blockchains, realize that this is more of a practical distinction than a strictly technical one. Both are often optimizing their own architectures to support Rollup. These rollups are expected to handle most of the trade execution within their scope.
Even Rollup isn't necessarily completely "modular" — the Rollup sequencer can agree on transaction sequencing, provide DA, and execute transactions before the main chain does anything. This is how users get pre-confirmed. The main chain then provides another "final" commitment, again declaring the DA and consensus on the order of Rollup's transactions.
Rollups and Integrated Chains
For our purposes, the more important distinction is "Rollup" or "Non-Rollup". Does the final state of the chain originate from data published to a separate main chain (i.e. DA layer)?
While we today associate DAS and validity/proof of failure with traditional rollups, we should note that these are logically different concepts. In theory, any "integration chain" (such as a typical Cosmos application chain) can be upgraded to add DAS and proofs of validity without having to publish its data to other external mainchains such as Ethereum. The node will sample and check the chain separately.
Vitalik talks about this difference in his Endgame:
You may notice that a "traditional big blockchain" (integration chain) with DAS + validity/proof of failure may end up looking like an "enshrined rollup"! Similarly, "a scalable and dominant rollup" could become so successful that it simply merges with its main chain to accommodate that rollup.
The boundaries of distinction become blurred at the limit.
Therefore, if you believe that DAS+ effectiveness/proof of failure is the end result, then "Rollup" in a sense is inevitable. There is a valid difference between the two methods in the preceding diagram:
When we talk about "Rollup" in this report, we are referring to the former (i.e. not an integration chain with DAS + validity/proof of failure, which may be referred to as built-in Rollup).
While "traditional" Rollup doesn't have a monopoly on DAS or proofs (i.e. integrated large blockchains can add them), note that we're overlooking a lot of technical details here, and you can't just pick Solana and decide "Oh, I guess we'll add DAS today".
This requires a fundamental refactoring of the protocol to start getting closer to what we're seeing Ethereum and Celestia doing:
Changing the way data is encoded to support DAS will equate to slowing down block encoding and propagation, starting to move closer to the traditional DA layer:
For this reason, we see the team build the following:
However, if you separate the time of fast chunks and DAS, they are not necessarily compatible. For example, you can imagine a chain like Solana offering two different paths:
Anatoly discusses in the podcast how Eclipse brings Ethereum, Celestia, and Solana together, and from the other end of the spectrum, you can imagine the DA layer adding a faster path before making the data available for sampling:
Providing two paths in the same base layer protocol effectively internalizes fast shared sorting, providing an interesting design based on Rollup. Note that at the moment this is still a very exploratory idea.
Confirm the rule
With that background, we can now begin to break down the security attributes of these different architectures.
First, nodes interact with any blockchain by running "confirmation rules":
"Confirmation rules refer to the algorithm that is run by a node to output whether a block is confirmed or not. In this case, under certain assumptions, mainly involving the synchronization of the network and the percentage of honest shares, when these conditions are met, the block will be guaranteed that a reorganization will never occur ".
There can be any number of confirmation rules for a given chain:
Because each acknowledgment rule can make very different assumptions, they can have very different security properties even when interacting with the same chain:
This distinction is subtle but important:
Security = Security + Activity
Now let's dive into whether Rollup "inherits security" from its main chain.
Inheritance, and perhaps more clearly, Rollup always "rents" rather than "inherits" anything in its main chain, pays an ongoing cost for the resources consumed (DA), and either party can choose to end the relationship. But that's not the interesting part of the problem.
Security, from now on we will focus on security. Security of an algorithm consists of Safety and Liveness:
Using Sreeram's excellent framework, we can further break them down into five attributes that work together to secure confirmation rules:
Let's consider an example of a hypothetical integration chain with DAS + validity/proof of failure. Its data is not published to any other external main chain. For simplicity, we assume instant finalization (e.g. Tendermint), so there is no usable distinction between an available ledger and a finalized ledger (e.g. Ethereum's Gasper).
We will consider three confirmation rules that can be used to trace the chain using different types of nodes:
Confirm that the rule has security attributes, the chain does not
Again, "we talk colloquially that a chain is secure, but in fact it is a confirmation rule attached to the security attribute".
Let's look at some examples.
CAP theorem
As background, the CAP theorem tells us that no ledger can satisfy both of these conditions at the same time:
Adaptivity (aka dynamic availability) - staying active with dynamic participation (i.e. if most nodes are offline); Finality (aka consistency) – keeping security under network partitions;
Consensus protocols tend to be divided into two parts, each of which satisfies one of the above conditions:
Bitcoin confirmation rules
Bitcoin's consensus does not provide any hard economic finality.
Nodes observe the longest chain in their local view, and each user is free to apply any confirmation rule they like (e.g. accepting blocks with >k confirmations). The standard is to wait for 6 blocks to be confirmed, but it's up to you.
For higher value transactions, it is reasonable to wait longer. There is a trade-off between wait time and security, i.e., the possibility of reorganization.
Ethereum confirmation rules
Ethereum's PoS consensus (Gasper) seems at first glance to sidestep the CAP theorem. However, it implements these two properties because it contains two nested ledgers:
Gasper belongs to the "ebb-and-flow" (also known as double ledger or double confirmation rule) protocol family. The two-ledger design falls outside the scope of the CAP theorem (i.e. it assumes a single confirmation rule). When the network is partitioned, the finalized ledger lags behind the adaptive ledger, but it catches up when the network is repaired.
This allows the trade-off between adaptability and finality to be addressed at the user level rather than at the system-wide level. This is a characteristic of the "longest chain of checkpoints" protocol proposed by the blockchain CAP theorem in terms of adaptability and finality that users can rely on. These protocols provide individual users with a choice between finality and adaptability, rather than imposing it at the overall system level.
Gasper explicitly exposes two different confirmation rules, mapped to the two ledgers mentioned above:
As discussed in the paper:
"More optimistic adaptive rules always confirm blocks marked as finalized by more conservative rules, and may confirm more blocks during variable participation levels. Customers (users) choose locally between confirmation rules based on personal preferences, while miners follow fixed block proposal rules that are consistent with these two confirmation rules".
This allows all (honest) nodes in the system:
Validators continue to lengthen the longest chain (mining new blocks at ever-increasing heights), regardless of the level of participation, but only when there is enough participation, new checkpoints will appear.
The longest chain (containing the most recent checkpoint) can alternate between different chains (i.e. reassemble incomplete blocks), but the checkpoint is guaranteed to be on a single chain regardless of network conditions (i.e. finality).
The security of users depends on the confirmation rules they follow. There is a trade-off between fast block acknowledgement and stronger security guarantees. Users who sell coffee may prefer activity over security, but users who sell yachts may prefer security over activity.
Ethereum nodes can also apply some other intermediate confirmation rule heuristics to practical purposes. Instead of using naïve k blocks as an adaptive confirmation rule, as Bitcoin does, we can add other heuristics that include assumptions about network synchronization and validator honesty.
This is exactly what is proposed in the Ethereum Consensus Protocol Confirmation Rules, which propose confirmation rules with the following properties:
This confirmation rule is not a substitute for economic finality. Instead, it provides useful heuristics for users who believe that network synchronization will remain in the near future. Let's compare the two:
Let's consider some examples, such as if you sell a yacht for $2.5 million in ETH, here are some possible confirmation rules:
Rollup confirms the rules
As with any chain, nodes interact with Rollup using different acknowledgment rules. Rollup's strongest confirmation rules will be finalized along with the consensus of its main chain. The Rollup sequencer can expose weaker confirmation rules for a better user experience (i.e. provide quick pre-confirmation for impatient users), but users can also wait for the full security of the main chain confirmation rules.
A typical Rollup transaction flow looks like this:
After the transaction data is published to the main chain:
Users can also confirm transactions faster by trusting the sequencer to confirm in advance, even before the primary link receives the data. If the sequencer behaves incorrectly, security can fail. Then, once the data is on the main chain (and you've checked the DA+ validity), only a mainchain failure (such as an Ethereum reorganization) will affect your security.
Therefore, even centralized orderers do not really reduce the security of "Rollup". You always get security that complies with the confirmation rules you need. Whether the Rollup has a sequencer-based or other design, you can use the same confirmation rules (e.g. wait for the main chain to be finalized and check the Rollup validity). Assuming proper implementation (e.g., enforcing transaction inclusion via the main chain), you can get the same security attributes within the same timeframe while keeping other conditions the same.
Similarly, you can imagine that Ethereum L1 block producers provide pre-confirmation due to slow block times, which does not make "Ethereum" less secure. You just need to decide whether to use another confirmation rule (less secure) until the Ethereum validator finalizes the higher security.
The idea of preconfirmation fits well with the logic of Gasper described by Vitalik:
The general principle is that you want to provide "as much consensus as possible" to the user: if there is > 2/3, then we reach consensus on a regular basis, but if there is < 2/3, then there is no reason to delay without providing anything, because obviously the chain will continue to grow despite the temporarily lower security level of the new block. If a single application is not satisfied with a lower level of security, feel free to ignore these chunks until they are finalized.
Putting all of this together, when all confirmation rules agree on the same state of the ledger at the same time, we have a "consistency area":
Confirm the rule - security and accessibility
If your confirmation rule is to trust a single sequencer run by an SBF, rather than a decentralized sequencer made up of the world's most reputable validators, then your security may be worse, and the active failure and reorganization are security failures.
Alternatively, you can wait for stronger (mainchain) confirmation rules to become available. Then, all else being equal, an untrusted sequencer won't affect your security. If you're selling coffee, you're probably going right away, but if you're selling a yacht, you'll need to double-check the main chain confirmation.
However, if everyone actually uses that confirmation rule to sell their yacht, we can't completely ignore the potentially low safety of the "trust random person running a separate sequencer" confirmation rule. Precise design is based on a balance of the level of progressive commitment required for what time for a given use case.
Again, this touches on real criticism of high-throughput blockchains like Solana. What confirmation rules can people actually use? You may have good security conditions to run Solana full nodes, but most people may not have access to that confirmation rule (i.e., depending on resource requirements and/or cost).
Direct verification (i.e., not just trusting the honest majority) is a core attribute of these systems. So, for a given confirmation rule, we really care about two aspects – security and accessibility:
In a word:
In fact, when we say that a given chain is secure, we are trying to express the notion that its associated confirmation rules are both secure and accessible.
Rollups with integration chain security
1 , integration chain with proof of validity of DAS+
We are now seeing that security regarding DA and state validity can be checked directly by cryptography (DAS + validity / proof of failure) without making strong assumptions about the operators of the chain. Any protocol can technically implement these. Full nodes can also check DA and state validity without external assumptions.
Now let's focus on other properties - activity and resistance to recombination. As we've seen earlier, these can fail no matter what kind of confirmation rule you run. Let's look at another integration chain that proves the finality of the DAS+ effectiveness of the +PoS single-socket:
Choosing strong acknowledgment rules is particularly effective for a subset of security failures, where even most malicious validators cannot trick full nodes or full validator light nodes into believing that:
Whether Ethereum has 1 validator or countless validators, all nodes more or less believe in the DA or validity of the block, which they are guaranteed by checking. Full validator light nodes can be checked in a simpler way (but note that DAS makes some other assumptions, which we'll discuss later).
However, a malicious majority of validators may prevent the ledger from growing, censoring you, or reorganizing the chain (which failures occur depends on the confirmation rules). DAS + ZK will not save you. Resistance to reorganization and activity always depend to some extent on the various underlying attributes of a given chain (e.g. reliable operators, economic incentives, social consensus, etc.).
Less obviously, activity and resistance to reorganization are still attributes of a given acknowledgement rule, since each node is subject to the same attack as in the table above. Regardless of the confirmation rules here, they have the same guarantee.
However, this becomes apparent again when you remove the single-slot finality assumption. In Ethereum's Gasper, depending on the ledger you follow (i.e. the longest chain ledger or checkpoint available), you will again have different activity and reorganization-resistant properties. Most malicious validators cause different security failures depending on the confirmation rules you run.
In any case, the point is that the underlying construction of the chain is very important here. You need strong operators, economic incentives, and social consensus to keep the chain active and resistant to restructuring. In addition, dual-ledger consensus protocols such as Ethereum provide users with valuable flexibility to calculate availability and finality according to their needs.
2, Proof of Rollup using DAS + validity
Now let's modify this example a bit:
You'll notice that Rollup has two completely separate types of confirmation rules for different timeframes (i.e. whether you're operating based on the pre-consensus of the sequencer or waiting for the final consensus of the main chain), let's now look at each path.
Fast Path - Before the main chain consensus
Rollup nodes can rely on confirmation from the sequencer (before publishing to the main chain), and we assume they can run the following Rollup nodes:
Technically, the Rollup sequencer can facilitate DAS and provide proof of validity before publishing to the main chain, but this doesn't actually happen. Full validator light nodes are usually designed to check these through the main chain, but I'm assuming that "live" DAS+ proofs can be compared more clearly to the same as the integrated chain.
The following table shows the changes compared to the integration chain example:
Deletions are shown with a red strikethrough and additions are shown in blue:
Slow path - Wait for the main chain consensus
For extra security, nodes can wait for consensus from the main chain (e.g. Ethereum), which is where it comes into play more clearly, i.e. Rollup nodes should also run the main chain node:
If we get a zero-knowledge proof-proof mainchain (e.g. Ethereum L1 zkEVM) + all rollups prove their state inside the main chain→ we get Vitalik's vision of proof of singularity. A zero-knowledge proof of validating Ethereum means validating all other chains and validating nodes of their internal implementations:
For simplicity, we assume here that the state validity of the rollup is verified within the main chain itself (e.g. the rollup has a built-in bridge with the main chain), so we can ignore explicitly running additional rollup node software outside the protocol.
The changes from the previous Fast Path Rollup table are as follows:
This is achieved by the mainchain forcing transactions to include or imposing sequencer/prover substitution, which we call "final" activity here, because from Rollup's point of view, it is a slow path, but from the perspective of the main chain, this can be considered "real-time" activity.
Rollup with integrated blockchain
Now we can see the changes in security attributes related to integrated blockchain and Rollup:
Activity and resistance to recombination
These attributes cannot be guaranteed with a password, and even across acknowledgement rules (for example, whether running a full or light node), you may be vulnerable to security failures.
If the operator is completely out of control, no full node or ZK proof can protect you from activity failures or reorganization.
These attributes are achieved through strong and decentralized operators, censorship-resistant mechanisms, consensus conducive to activity, high "cost" of restructuring, strong social consensus, etc. Objectively comparing these is often challenging.
How do you measure operator decentralization and social consensus? There is no one right answer. These are arguably the most difficult aspects to design, and they are indeed very unique to a given chain.
Importantly, we see that Rollup can delegate anti-reorganization and activity to the main chain, and that the confirmation rules used on Rollup can have the same security attributes as if they were running on the main chain within the same time frame.
Chains can even choose which attributes to delegate to which chain, and different types of "L2" architectures (such as validiums, optimism, and sidechains) can absorb different subsets of security attributes. For example:
Rollup can also provide users with an escape route to exit Rollup, but retain the ability to vet users and prevent deposits from entering Rollup (this is how Loopring works, for example). If the deposit remains unprocessed after a certain period of time, the user can withdraw the locked funds from the L1 contract.
This highlights the importance of such mechanisms.
Data availability and status validity
Unlike activity and anti-recombination, nodes can ensure the validity of DA and state without making any large threshold assumptions (or security trade-offs between the two). Malicious majority block producers may cause activity and reorganization failures, but they will not cause DA or validity failures for full nodes or full validator light nodes.
However, consensus validator light nodes are of course affected by the state validity of honest majorities and DA failures. They just believe everything the consensus says. That's why DA and state validity are what make security confirmation rules accessible and really work. This is often the huge ideological difference between traditional Rollups and large blockchains that don't place much emphasis on user verification.
In order, these are often the preferred ways to balance security and accessibility:
Note that 2 (full node) is actually the most secure. ZK verification is straightforward, but DAS nodes make some additional assumptions that full nodes don't. However, they provide nearly the same security as full nodes, and with resource requirements at a fraction of that, they are scalable.
Full nodes only need to download all the data, so they are 100% certain. They sign the block only when everything is there. No assumptions have been made about external parties.
The goal of DAS is to achieve almost as good security as full nodes, while with significantly lower resource requirements (i.e., higher scale). This article on light node data availability security levels covers this well.
In short, you usually make some assumptions around network synchronization and whether there are enough nodes to reconstruct the data. If hostile block producers hide any data, even a small group of honest light nodes should be able to collectively rebuild blocks. There are also assumptions about selective share disclosure, in which hostile block producers can deceive a small number of light nodes individually, but not collectively.
These "N-in-2" assumptions (e.g., an honest minority of nodes can secure DAS) are very advantageous in relation to the typical approximate "N/2" assumption (e.g., 51% of block producers can lead to reorganization). Vitalik has a good introduction to this in his post on the trust model.
Overall, DA and state effectiveness are not "commissioned" by Rollup as activity and recombinant resistance. DA and state validity can be verified directly by the user, while other attributes are more heavily dependent on the consensus participants of the chain and their incentives.
Review an example of a previous validation of the Rollup proof:
In either case, you can guarantee effectiveness. No matter where you check it, you can't determine its effectiveness. Ethereum does not have the same truly "forced" effectiveness as Ethereum nodes "force" anti-restructuring or active properties. Anti-restructuring and vitality largely depend on who you get them from.
Consider a scam chain-based rollup:
Rollup is able to expose confirmation rules with the same security attributes as their main chain, which they can receive at most at the rate of their host chain consensus (in fact, it will usually be slower, depending on how often Rollup is published to the main chain).
Rollups can also provide "happy path" with more relaxed confirmation rules (i.e., sequencers) for a better user experience, but they retain transaction rollbacks in case of failure. If your sequencer stops, you can continue moving. However, this is not the case if your chain relies entirely on your own set of validators (i.e. as an integration chain).
Choosing Rollup's main chain wisely can have a concrete impact on security attributes. It is especially valuable to leverage a backchain with strong activity (ledger growth + CR) and resistance to reorganization.
Different security assumptions for different time periods
Let's look at a simple example. Chain X is deciding whether to deploy as a Rollup on an existing main chain or as its own integrated blockchain.
Rollup has the following characteristics:
Integrated blockchain has the following characteristics:
The following table gives a simplified visual representation of the best security guarantees that users may have under various implementations (i.e., they use the strongest acknowledgment rules available). In particular, we focus here on activity and resistance to recombination (because we assume that the chain will only achieve DAS+ proof of effectiveness in these two cases):
Rollup's "ultimate security" is higher than its "real-time security" because the main chain cannot guarantee us faster than its own block time. Even though you can check that the sequencer's pre-acknowledgements are valid state transitions, you can't fully guarantee their finality until they finally reach the DA layer.
But as we've seen, deploying to a strong mainchain in a rollup fashion enhances security. They can rent security at the speed of their main chain. Fundamentally, there is no way to obtain all the security attributes of the main chain faster than the consensus of the main chain itself.
However, users tend to be impatient. As a result, Rollup will typically provide faster pre-confirmation, but the guarantee will be lower during this period. Rollup can choose a balanced sequencer design:
Interestingly, you can argue that L1 ordering rollups are less active than centralized sequencers, depending on your time scale. So far, we've talked about activity, including it in some sort of "finite time" concept. However, this is entirely relative and subjective. Relative to what? How much time does it take?
A pure L1 sequential rollup will only be included at the speed of L1 blocks (e.g. 10 seconds), and you have no guarantee of activity between these blocks when the world around you changes. So it depends on your benchmark:
If you try to implement a "real" based rollup without pre-confirmation, it is even possible that pre-confirmation will occur anyway. For participants, such as Ethereum builders and validators, there is a financial incentive for them to make this commitment themselves. This is exactly why there is discussion about how Ethereum builders and stakeholders are trying to provide fast pre-confirmation at the base layer.
Here's one last important note. Assuming that Rollup users can fall back to the same level of activity as the main chain, assuming you can force inclusion entirely at the speed of the main chain block (e.g. if the Rollup orderer is reviewing you, you can force transactions to be included in the next Ethereum block of the main chain).
In practice, there is usually a short delay. If you allow immediate mandatory inclusion, you risk exposing profitable censorship MEVs along with other complexities. However, some designs can provide near real-time activity guarantees from the main chain (e.g., perhaps at the speed of several main chain blocks instead of one block).
Regardless of the exact timescale, the ultimate activity of the absorption of the main chain is very strong, and using a strong main chain as a coordination mechanism provides credible threats and exit rights. The mere exposure of this credible threat alone makes it highly unlikely that it will be needed to prevent malicious behavior in the first place.
For example, if the user has a reliable mechanism to forcibly exit or even forcibly remove the operator, then the centralized Rollup sequencer cannot arbitrarily extract rent from the user and lock it in. This is a general area discussed in Chris Goes in his talk on MEV Conversion Cost Edge and Slow Gaming.
Of course, unexpected activity can also occur, in which case this backup path can again be very valuable.
Proof does not protect the chain, but protects the user
Following all this, we can see that for a given confirmation rule, it turns out that it is more accurate to protect the different "observers" (users) of Rollup than to protect the "Rollup" itself. The security of "Rollup" does not exist as a single specific measure.
Ensuring the safety of the observer is of course the most important thing, because we are all observers of the chain! This chain is whatever its observers say. If you can't observe it in a safe way, you have to trust someone else (such as a verifier) to tell you the "truth" about it. But we don't want to trust, we want verification→ we want proof.
To understand why it is important to distinguish between "proof of chain" and "observer of proof chain", consider the following:
Proven adds security to chain observers (i.e., light nodes) whose validity cannot be checked directly. We don't want users to have to run powerful full nodes, so these proofs are important.
Attestation secures the Rollup bridge
Rollup's verification bridge is an extremely important observer! The evidence does guarantee the safety of the bridge!
As with any typical light node, the bridge cannot directly check the validity of Rollup. We do not believe in honest majorities, but protect bridges with evidence. The consensus protocol for database A (the DA layer) sorts the data blobs and then verifies that the bridge independently checks the validity of the corresponding update to database B (Rollup):
The bridge is an observer of another chain, and each asset it mints always carries the security assumption of the confirmation rules of the corresponding bridge. The security of its confirmation rules can have wide-ranging implications. That's why it's so important to build secure bridges (or ideally, reduce the need for so many bridges by scaling single-chain execution further in the first place).
If you run full nodes for the chain, malicious parties cannot trick you into accepting invalid state transitions. However, if the malicious party has different confirmation rules, it can still spoof the bridge. If you hold collateral-backed assets in the bridge, then your funds may become unsupported. In this sense, the security failure of the spoofing bridge is "contagious".
Let's consider an old hypothetical scenario about Terra:
With the collapse of Terra, the price of LUNA plummets, and eventually, the profit of the set of validators that theoretically becomes malicious will exceed the value of the staked LUNA, and the Terra validator can sign invalid blocks and do the following:
The bridge uses acknowledgment rules with stronger trust assumptions.
Terra validators cannot steal large amounts of Terra's own assets from full nodes (they will not be deceived), they will reject these blocks. However, validators can trick consensus validators into light clients (including bridges), which is why consensus errors affect cross-chain assets.
Note that it is important that these faults do not "infect" the rest of the chain, i.e. the fault "infects" Osmosis assets exposed to the Terra bridge route, but there is no security fault in the Osmosis chain itself.
However, we obviously want to bridge things (in general, cross-chain communication), it would be bad to limit ourselves to using native assets on their main chain, we need chains to communicate securely and bridge across chains.
As a thought experiment, the simplest solution is to have each user run full nodes of each chain, which includes the cross-chain bridge itself. Keep in mind that we've seen some one-way embedded full-node bridges:
This works for Ethereum full nodes, but this obviously doesn't scale. You can't start having each Cosmos chain just need to run full nodes for every other Cosmos chain. These bidirectional full node bridges do not scale, they just increase hardware requirements.
Fortunately, there is a more scalable option. We can deploy bridges to fully verify the state validity and DA of another chain (in addition to still checking consensus).
State Validity - While IBC is currently used with traditional proof of consensus, it can be modified to add proof of validity for connecting chains, and now bridges are not spoofed by invalid state transitions. This would have prevented exactly what attack described earlier, and if the bridge was able to verify the validity of the state transition, it would have rejected the Terra validator's block as invalid.
This looks very similar to how the Rollup bridge on Ethereum checks for Rollup proofs, except that it can also be bidirectional.
DA - In addition, a chain may require its nodes to run DAS light nodes that connect the chain. For example, you can have two Cosmos chains that require their own validators to run the other chain's DAS light nodes (if each chain implements DAS light clients, which are not currently supported). Once this is done, each chain can now know each other's validity and DA without having to run full nodes.
For Rollup, by definition, you own all the data on the main chain, so the bridge there can access it. Rollup nodes, on the other hand, run mainchain nodes.
Dependent and independent chains
Let's look at our five security attributes again, now in the context of observing Rollup's Rollup verification bridge on Ethereum:
Note that the security of a bridge is not only maximized by super-strong confirmation rules for additional chains (for example, a full validator bridge to a chain with a super-trustworthy set of validators). If the bridge has the same security assumptions as the main chain, you can get the most security when cross-chain native assets.
Vitalik provides a useful illustrative example:
"You transfer 100 ETH to a bridge over Solana and get 100 Solana-WETH, and Ethereum gets 51% attacked. The attacker deposits a bunch of their ETH into Solana-WETH and then resumes the transaction on the Ethereum side as soon as the Solana side confirms it. The Solana-WETH contract is no longer fully supported, and maybe your 100 Solana-WETH is now only worth 60 ETH. Even with a perfect ZK-SNARK-based bridge fully validating consensus, it is still vulnerable to a 51% attack like this.
Therefore, it is always safer to hold Ethereum native assets on Ethereum or Solana native assets on Solana than to hold Ethereum native assets on Solana or Solana native assets on Ethereum. In this context, "Ethereum" refers not only to the underlying chain, but also to any appropriate L2 built on it.
If Ethereum is 51% attacked and recovers, Arbitrum and Optimism will also recover, so even if Ethereum is attacked by 51%, "cross-rollup" applications that save state on Arbitrum and Optimism are guaranteed to remain consistent. If Ethereum hadn't been 51% attacked, there would be no way to do a 51% attack on Arbitrum and Optimism, respectively. Therefore, it is still completely safe to hold assets issued by Arbitrum-based Optimism.
You can replace Solana with any chain you want - even a hypothetical chain where you surpass an Ethereum validator in terms of trust, and fundamentally, any security assumptions are additive when you talk about cross-chaining assets with their ledger of record (e.g., ETH from Ethereum), and there is always the possibility of a connected chain reorganizing or activity failure.
However, chains with merged consensus (i.e. rollups that share the consensus of their main chain) can sidestep these additional security assumptions. Cross-chain bridges between these different regions can have the same final activity and anti-recombination properties as the main chain itself. Shared consensus minimizes cross-chain trust assumptions within that shared security zone.
What are reasonable security assumptions is up to you. In fact, there has not been a similar consensus failure between major chains. This would be obvious and costly, but it could be a stronger assumption about connecting weaker chains.
There are also some drawbacks to binding a Rollup chain to the main chain. Let's compare two cross-chain scenarios, in both cases we have two chains that use two-way full validator cross-chain bridging:
Similarly, lock-ins and excessive rent-seeking have potential positive and negative effects, highlighting why a neutral and censorship-resistant base layer is so important:
There are trade-offs and benefits here, but also keep in mind that there is a huge path dependency on where interesting assets are, and if you want to use a bunch of Ethereum-native assets (including those in its Rollup), it makes sense to root your chain in Ethereum and its cross-chain bridges.
Conclusion
"Rollups inheritance security" is a good shorthand, but remember these are the key points we really mean:
Now, consider the benefits of deploying Rollup on the integration chain:
User safety - Whether you want to implement any cross-chain bridges or not, Rollups can lease DA from its main chain and reclaim its consensus, which allows Rollup to expose confirmation rules that match the main chain to its users without having to reach its own consensus;
Cross-chain security - Rollup can build cross-chain within the shared security domain of the main chain (i.e. the main chain itself and its Rollup), and its security properties are comparable to operating on the main chain itself;
We should see that this is actually two sides of the same coin, and Rollup just allows the chain to provide confirmation rules, and its security can reach the security of the main chain. Both cross-chain bridges and normal users are observers of chains with given acknowledgment rules. Bridges are perhaps the most important "observers" in these chains because their security has wide-ranging implications.
When we try to create a secure system, we need to care about the security of given confirmation rules as well as their accessibility. If most observers (users) interacting with these chains are out of reach, then security confirmation rules don't help much.
While we today associate DAS and proofs of validity with Rollup, they are logically separate concepts. Any chain can integrate these technologies, and the distinction between what is a rollup or is not a rollup begins to break down at the end game (i.e. for a single integrated rollup, it may have logically separate DA and execution layers under one protocol).
However, the "traditional rollup" and DA layers clearly dominate these verification and scaling technologies today.