Arbitrum has lately introduced up a dialogue on Medium about Delay Assaults on Rollups. In brief, their publish raises an essential concern that impacts all optimistic rollups which might be primarily based on interactive verifications, reminiscent of Optimism, Arbitrum, Cartesi, Truebit, and so on.
In brief, though the assault doesn’t compromise the safety of the rollups chain, it permits a well-funded celebration to delay its finality by repeatedly burning collaterals at some stage in the assault.
This information might have been worrisome, because it impacts a number of totally different protocols. Nonetheless, Delay Assaults are removed from an unsurmountable downside.
To begin with, Arbitrum itself has introduced of their article that they know an answer to the issue. They’ve introduced a brand new protocol to be printed quickly, which is already being applied.
On one other entrance, Cartesi’s contributors have additionally labored to sort out this Delay Assault and so they have simply printed an answer to the difficulty on this article.
In abstract, underneath Cartesi’s proposal, a workforce of dishonest events with x funds will be defeated in a single dispute by an sincere participant who’s prepared to deposit log(x) funds. This makes Delay Assaults inconceivable and sibling assaults impractical.
Delay Assaults on Rollups – Offchain Labs, Medium.
This text digs into the delay assault downside, and discusses the way it was dealt with in varied variations of the Arbitrum rollup protocol.(…)That is primarily based on a technical breakthrough from the Arbitrum analysis workforce that makes all-against-all challenges possible and environment friendly. This permits a single sincere staker to effectively defeat a military of attackers who’ve posted a forest of malicious branching assertions.
NT – Nehab and Teixeira, ArXiv.
On this paper, we suggest a sensible dispute decision algorithm by which a single sincere competitor can win disputes whereas spending effort linear on the price of the computation, however solely logarithmic on the variety of dishonest opponents. This algorithm is a novel, stronger primitive for constructing permissionless fraud-proof protocols, which doesn’t depend on advanced financial incentives to be enforced.
Completely satisfied to attach with anybody who’s considering a deeper dive.