On the security challenges of L2 and L3 AppChains
When you deploy your application to a dedicated chain, make sure you consider how validity is enforced, the challenges of anti-censorship, MEV and potential data availability hazards. These choices will be critical to the security of your chain.
Speaker
Michael Zaikin
Event
EthCC[8]
Date
July 1, 2025
Category
Layer 2s, Layers above and beyond
Type
Talk
Language
EN