Back to List

On Legitimacy of Blockchains - 6

Author: Youngjin Kang

Date: 2022.11

(On Legitimacy of Blockchains - 6)

It is also important to mention that layer 2 (off-chain) solutions are often being presented as means of overcoming the blockchain's intrinsic limitations. Protocols such as Bitcoin's Lightning Network, Ethereum's ZK-Rollups, and Optimistic rollups, all strive to solve the intrinsic bandwidth/cost problems of the on-chain network by performing a huge number of off-chain transactions and only committing their end-result to the blockchain. A decent analogy would be that, when shopping at a grocery store, the customer doesn't make a separate payment for every individual product; the cashier just sums up the fees of all the purchased items and issues a single transaction based upon the sum.

Such off-chain transactions are indeed pretty safe from a security point of view, since the combined usage of hash-code comparison and asymmetric cryptography allows the content of each off-chain transaction to be hidden from intermediaries, while also being tamper-proof. And the identities of all the intermediaries, senders, and recipients, can all be nicely hidden from the eye of the public (for the sake of not giving the society a chance to selectively exclude certain "unfavorable" individuals from engaging in financial activities), since each off-chain transaction can be issued through a complex network of anonymous agents, each of whom doesn't necessarily know about each other. This is a nice functional equivalent of onion routing. Hence, such a set of anonymous interactions can all take place inside the deep web (via Tor browser or so) in order to add yet another layer of security on top of the whole pool of interactions. How nice is this?

The involvement of layer 2 solutions, however, raises a couple of concerns. Although the end-results of their off-chain processes are directly tied to the blockchain itself, layer 2 solutions introduce a bunch of "holes" through which various scammers can sneak in and fool the end users using all sorts of fabricated "facades" of services instead of the actual services themselves.

When we are using only the blockchain's main (layer 1) protocol, all we need to do is simply install a single application which directly interacts with the blockchain's nodes (e.g. Bitcoin Wallet). As long as we make sure to hide our private keys and pass phrases, we do not have to worry about being scammed because this standalone program will handle everything related to transactions. When we are using layer 2 protocols, however, we are relying on centralized local services which may have chances of losing your line of transactions or stealing your confidential user info (unless you are well-versed in blockchain technology and have time to monitor the whole process of how exactly they are handling your data, etc).