layer2.id

Scroll

Rollups bundle hundreds of transactions into a single proof submitted to Layer 1.

Compress

Data compression reduces on-chain footprint while preserving validity guarantees.

Layers

Stacked execution layers process transactions off-chain, settling finality on the base layer.

Batch

Transaction batching amortizes the cost of L1 submission across many users.

Verify

Verification ensures every rolled-up transaction is valid before anchoring to mainnet.

Speed

Rollups achieve near-instant confirmation while inheriting L1 security guarantees.

The Rollup Bear

optimistic & zk — two paths, one sky

Transactions settle
like dew on morning grass —
unseen, but certain.

Bidirectional

State channels allow two parties to transact freely off-chain in both directions.

Lock

Funds are locked in an on-chain contract before the channel opens.

Unlock

When the channel closes, the final state is settled on-chain and funds are released.

Lightning

Payment channels enable instant micro-transactions at virtually zero cost.

Handshake

Both parties must agree on every state update — mutual consensus keeps channels honest.

The Channel Crown

peer-to-peer paths through the ether
Chain Link

Sidechains are independent blockchains connected to the main chain via a two-way bridge.

Bridge

Bridges transfer assets between the main chain and sidechain through lock-and-mint mechanisms.

Parallel

Sidechains run parallel consensus, processing transactions independently from L1.

Shield

Security models vary — some inherit L1 security, others maintain their own validator sets.

Anchor

Periodic checkpoints anchor sidechain state to the main chain for added security.

Fork

Sidechains can fork independently, experimenting with new features without risking the main chain.

The Sidechain Hunter

parallel worlds, loosely tethered

Bridges span the void,
carrying trust in packets —
consensus, whispered.

Tree

Plasma creates a tree of child chains, each processing transactions and reporting to the parent.

Nested

Nested chains allow recursive scaling — each child can spawn its own children.

Prune

Data pruning removes obsolete transaction data, keeping the chain lightweight.

Root

The root chain anchors the entire Plasma hierarchy, providing final dispute resolution.

Merkle

Merkle trees enable efficient fraud proofs — proving any transaction with minimal data.

The Plasma Swan

child chains nesting like Russian dolls
Zero

Zero-knowledge proofs verify truth without revealing the underlying data.

Keyhole

Only the prover holds the key — the verifier sees just enough to confirm validity.

Mask

Privacy-preserving computation lets you prove compliance without exposing identity.

QED

Mathematical certainty — a valid proof is irrefutable, like a completed theorem.

Hidden Eye

The network sees the proof but never the secret — trustless privacy at scale.

The Proof Cross

knowledge without revelation

Every layer rests on another.
Every star is someone else's sun.