Content
@
0 reply
0 recast
0 reaction
the intern
@0xtheintern
TL;DR - Both sharding and layer 2 use data sharding, verification techniques (fraud proofs or ZK-SNARKs), and communication solutions. ...more 👇
6 replies
0 recast
0 reaction
the intern
@0xtheintern
- Layer 2 solutions also enable a spectrum of security models catering to different use cases. This allows some applications to have faster transaction speeds and lower fees without compromising security for applications that require the strongest security guarantees of the main blockchain.
0 reply
0 recast
0 reaction