Alex G Profile picture
21 Oct, 15 tweets, 5 min read
1/ Really well-written arguments by @kaiynne! A perfect starting point for the conversation about L2 scaling.

The crucial question not addressed in this post: what about negative network effects of OR (aka you can't securely hold >$50M in a single OR instance)?

A thread 👇
2/ As @VitalikButerin pointed out in his ETH Online talk, optimistic rollups expose stong anti-network effects: the more volume a single OR has, the less validators can/will run the full node, i.e. the less secure it is to rely 1-of-N honest assumption.

But it doesn't end here.
3/ Optimistic rollups can be hacked at L1 using a 51% soft-fork attack (with every asset stolen from them). Here is the description of this attack vector:

ethresear.ch/t/nearly-zero-…
4/ The nominal cost of such an attack is currently $256k/hour or $43M/week (see the link below). But the actual cost is much lower, since you only need a plausible commitment to force rational miners into compliance (see the attack description above).

crypto51.app/coins/ETH.html
5/ This attack vector cannot be mitigated as long as ETH mainnet remains PoW (quite some time yet).

Needless to say, these concerns do not apply to ZK rollups. Cryptographic assumptions aside, ZKRs offer exactly the same passive security guarantees as L1's.
6/ So, what are the implications of this? If a single optimistic rollup cannot hold substaintial value (in Defi we're talking about billions of USD), it has no way to become a single platform for composable Defi protocols. Period.
7/ So, optimistic rollups can't save Defi composability, and @kaiynne ruled out other solutions in his post. Is there really no hope? 😨

Well, let's dig deeper.
8/ "Even if ZKrollups progressed at a breakneck pace, all variations currently require rewriting contracts in a new language."

This used to be the case. But I'm excited to announce this statement is no longer true 😎
9/ It will very soon be possible to take any existing contract written in Solidity/Vyper and deploy it to @zksync with a minimum (if any) modifications.

zksync.curve.fi on our testnet had a hint at how this will work. Please stay tuned for a few more weeks!
10/ One last point from the post I'd like to expand:

"The final major concern is on the impact on cross-layer composability from withdrawal delays — a concern for basically all scaling solutions except alternate L1’s."

Correction: expect alternate L1’s *and ZK rollups*.
11/ 1-week withdrawal delays are indeed a hugh problem for optimistic rollups. Using payment channels to accelerate exist will be highly capital-inefficient (in other words, very expensive for users). Here is a great post about it:

medium.com/starkware/the-…
12/ But ZK rollups (such as @zksync) can provide finality in minutes and do not suffer from this problem at all.

This enables a gradual transition from L1 to ZK-powered L2. Here is how this will work:
13/ Users have their assets in a ZK rollup, enjoying L1-level security and scalable interaction with contracts in L2.

Whenever they need to interact with legacy protocols on L1, they simply do it with a few min delay. Moreover, many of these transactions (e.g. Uniswap trades)...
14/ ...can be bundled together and executed as one single tx on L1, thus effectively scaling L2<>L1 interaction.
15/ If this sounds too good to be true... well, it kind of is! ¯\_(ツ)_/¯

Zero-knowledge proofs are a once-in-a-generation breakthrough. Few understand. And we haven't even spoken about frontrunning-resistance—but that's a topic for another time.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Alex G

Alex G Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @gluk64

7 May
Interesting reminder how security is holistic: it includes cryptography, protocols, clients, user flows, habits, etc. A system is only as secure as its weakest link.

A thread on key management in @zksync, dangers of pwd-protected wallets, and what's wrong with Ledger 👇
Passwords are notoriously unsecure because most ppl don't care to diversify them across different services – it's just too hard. Hackers posses over half a billion of compromised pwds linked to user identities: haveibeenpwned.com/Passwords
So even if your service handles passwords properly (salted multi-round PBDKF2, etc), your users are still vulnerable to phishing and hacks on other less secure websites they use. Countless hacks on the highest-profile targets serve as a proof.
Read 24 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!