🎉 Gate Square Growth Points Summer Lucky Draw Round 1️⃣ 2️⃣ Is Live!
🎁 Prize pool over $10,000! Win Huawei Mate Tri-fold Phone, F1 Red Bull Racing Car Model, exclusive Gate merch, popular tokens & more!
Try your luck now 👉 https://www.gate.com/activities/pointprize?now_period=12
How to earn Growth Points fast?
1️⃣ Go to [Square], tap the icon next to your avatar to enter [Community Center]
2️⃣ Complete daily tasks like posting, commenting, liking, and chatting to earn points
100% chance to win — prizes guaranteed! Come and draw now!
Event ends: August 9, 16:00 UTC
More details: https://www
Three minutes to understand the Zircuit sorter mechanism
Author: 0xTodd
Taking advantage of Zircuit's $ZRC official TGE, let's talk about an interesting mechanism in this project related to the sequencer.
Zircuit has its own L2, which is characterized by a solution called "Sequencer Level Security (SLS)".
We all know that the import and export of transactions in L2 are currently sorted through the official sorter of the project party. Of course, due to the existence of ZK/ challenge proof, we are not generally worried about the sorter being malicious.
Overall, the sorter is a neutral role, always executing each transaction justly and impartially.
So, even though the sorter is neutral, can we make an effort to let it join the camp of kindness?
So, Zircuit has enabled this SLS mechanism, which is designed to isolate "malicious transactions".
Normally, how does an L2 transaction get onto the chain? It's a simple four-step process:
Users initiate transactions and broadcast
Transaction goes to mempool (mempool) and waits
As a neutral camp, help it pack into the Block
Trading on-chain
But based on the SLS mechanism, this step has been transformed into five steps:
Users initiate transactions and broadcast
Transaction goes to mempool (mempool) and waits
As a good camp, the sorter uses some tools to check whether the transactions are malicious.
If there is no malicious intent, help pack it into the Block.
On-chain Trading
But what if there is a suspected malicious transaction? It changes from step four:
If suspected of malice, enter the isolation pool
The isolation pool is verified without error, and the sorter continues to pack it.
Or:
If suspected of malice, enter the isolation pool
If the isolation pool review finds that it is indeed a malicious transaction, then refuse to package it on the chain.
The SLS checks for malicious standards and may use some Open Source libraries and AI assistance for judgment.
There is hope for achieving certain effects in the future, such as stolen assets that may never be transferred or crossed back to L1. It is still meaningful for the current hostile on-chain environment, which is like a dark forest.
Of course, since it is a transaction audit, it is inevitable that there may be some collateral damage. However, I understand that by improving the Algorithm of the isolation pool, it can actually drop such issues as much as possible.
This is a double-edged sword, blockchain emphasizes permissionless, which is slightly contrary to SLS. From the perspective of normal users, such L2 is indeed safer.
But overall, I feel that although there is a slight impact on permissionless, the increase in security, especially in protecting inexperienced users, is still worth it.
At the end, attached: the original paper of Zircuit's SLS mechanism: