📢 Gate Square #Creator Campaign Phase 1# is now live – support the launch of the PUMP token sale!
The viral Solana-based project Pump.Fun ($PUMP) is now live on Gate for public sale!
Join the Gate Square Creator Campaign, unleash your content power, and earn rewards!
📅 Campaign Period: July 11, 18:00 – July 15, 22:00 (UTC+8)
🎁 Total Prize Pool: $500 token rewards
✅ Event 1: Create & Post – Win Content Rewards
📅 Timeframe: July 12, 22:00 – July 15, 22:00 (UTC+8)
📌 How to Join:
Post original content about the PUMP project on Gate Square:
Minimum 100 words
Include hashtags: #Creator Campaign
Mathematical models reveal the selection logic of the L2 phase: why might phase 1 be skipped?
Written by: Vitalik Buterin
Compiled by: Wenser, Odaily Planet Daily
Editor’s note: The discussion surrounding the three phases of Ethereum rollup security has always been a focal point for the Ethereum ecosystem community. This not only concerns the operational stability of the Ethereum mainnet and L2 networks but also relates to the real development status of L2 networks. Recently, Ethereum community member Daniel Wang proposed a naming label #BattleTested for the L2 network Stage 2 on the X platform. He believes that only L2 networks with current code and configurations that have been live on the Ethereum mainnet for over 6 months, maintaining a total value locked (TVL) of over 100 million dollars, with at least 50 million dollars in ETH and major stablecoins, can earn this title. This title is dynamically assessed to avoid the emergence of "on-chain phantoms." Ethereum co-founder Vitalik subsequently provided detailed answers and shared his views on the issue, which Odaily Planet Daily has compiled as follows.
The 3 stages of L2 network: from 0 to 1 to 2, security is determined by governance share.
The three phases of Ethereum rollup security can be determined by when the security council can cover the non-trust (i.e., purely cryptographic or game-theoretical) components:
We can use the chart below to represent the "voting shares" held by the security committee at different stages:
An important question is: What are the optimal timings for L2 networks to transition from stage 0 to stage 1, and from stage 1 to stage 2?
The only valid reason for not immediately entering Stage 2 is that you cannot fully trust the proof system — this is an understandable concern: the system consists of a large amount of code, and if there are vulnerabilities in the code, then attackers could steal all users' assets. The stronger your confidence in the proof system (or conversely, the weaker your confidence in the security committee), the more you want to push the entire network ecosystem to progress to the next stage.
In fact, we can quantify this using a simplified mathematical model. First, let's list the assumptions:
Under these assumptions, considering the specific probability of the proof system collapsing, we aim to minimize the possibility of L2 network failure.
We can use the binomial distribution to complete this task:
Presented here in chart form:
As deduced above, with the improvement in the quality of the proof system, the optimal stage shifts from stage 0 to stage 1, and then from stage 1 to stage 2. Using a proof system of stage 0 quality for the network operation of stage 2 yields the worst result.
Now, please note that the assumptions in the simplified model above are not perfect:
Both arguments indicate that phases 1 and 2 are more attractive compared to what is shown in the chart.
If you believe in mathematics, then the existence of Stage 1 will almost never be proven to be reasonable: you should go directly into Stage 1. The main objection I've heard is that if a critical error occurs, it might be difficult to quickly obtain the signatures of 6 out of the 8 members of the Security Committee to fix it. However, there is a simple solution: grant any member of the Security Committee the authority to delay withdrawals by 1 to 2 weeks, giving the others enough time to take remedial action.
At the same time, however, jumping to phase 2 too early is also wrong, especially if the work of transitioning to phase 2 comes at the expense of strengthening the underlying proof system. Ideally, data providers like L2Beat should showcase proof system audits and maturity indicators (preferably indicators of the proof system implementation rather than the entire aggregation, so that we can reuse them), along with demonstrations of the phases.