L2 (Layer 2)

Protocol

Scaling layer that inherits security from a base L1.

Layer 2 solutions scale usage by moving most execution off chain while anchoring data and security to L1. Popular designs are optimistic and ZK rollups.

Frequently asked questions

  • How do L2s inherit security?
    They post data or proofs to L1 so users can verify state and exit if needed.
  • What fees do L2s charge?
    Lower execution fees plus a share of L1 data costs. Fees vary by rollup design and demand.
  • How do I bridge to L2?
    Use the official bridge or supported wallets. Verify URLs and contracts before sending.