L2 (Layer 2)
Protocol
Scaling layer that inherits security from a base L1.
Layer 2 solutions scale usage by moving most execution off chain while anchoring data and security to L1. Popular designs are optimistic and ZK rollups.
Frequently asked questions
How do L2s inherit security?
They post data or proofs to L1 so users can verify state and exit if needed.What fees do L2s charge?
Lower execution fees plus a share of L1 data costs. Fees vary by rollup design and demand.How do I bridge to L2?
Use the official bridge or supported wallets. Verify URLs and contracts before sending.