These proofs primarily act as a safeguard against incorrect state transitions. Since they are only activated when inconsistencies are identified, they conserve computational resources, making them ideal for environments where scalability is a priority.Â
For example, Fraud proofs are crucial in Optimistic rollups to identify and handle invalid transactions. Whenever a transaction is approved, there's a specific dispute period where anyone can challenge the current state by presenting a valid fraud proof. If someone can prove a transaction is fraudulent during this window, it is nullified and the network readjusts to the previous state.
Fraud proofs are not without their cons. They require constant communication between multiple parties. This back-and-forth can lead to system disruptions and open the gates for dishonest behavior or other illicit actions.
āĻļāĻžāĻ°ā§āĻĄāĻŋāĻ āĻšāĻ˛ā§ āĻŦā§āĻ˛āĻāĻā§āĻāĻ¨āĻā§ (āĻŦāĻž āĻ āĻ¨ā§āĻ¯āĻžāĻ¨ā§āĻ¯ āĻ§āĻ°āĻ¨ā§āĻ° āĻĄā§āĻāĻžāĻŦā§āĻ¸āĻā§) āĻā§āĻˇā§āĻĻā§āĻ°, āĻŦāĻŋāĻāĻžāĻāĻŋāĻ¤ āĻŦā§āĻ˛āĻāĻā§āĻāĻ¨ā§ āĻŦāĻŋāĻāĻā§āĻ¤ āĻāĻ°āĻžāĻ° āĻĒāĻĻā§āĻ§āĻ¤āĻŋ āĻ¯āĻž āĻ¨āĻŋāĻ°ā§āĻĻ...
WAGMI āĻšāĻ˛ā§ "We're All Gonna Make It (āĻāĻŽāĻ°āĻž āĻ¸āĻŦāĻžāĻ āĻ¸āĻĢāĻ˛ āĻšāĻŦ)"-āĻāĻ° āĻ¸āĻāĻā§āĻˇāĻŋāĻĒā§āĻ¤ āĻ°ā§āĻĒ āĻ¯āĻž āĻāĻļāĻžāĻŦāĻžāĻĻā§ āĻŽāĻ¨ā§āĻāĻžāĻŦāĻā§ āĻā§āĻ¸āĻžāĻš...
āĻā§āĻ°āĻŋāĻĒā§āĻā§ āĻāĻāĻ¨ā§āĻāĻžāĻ° āĻļāĻŦā§āĻĻāĻŦāĻ¨ā§āĻ§āĻāĻŋ āĻĻāĻŋā§ā§ āĻā§āĻ°āĻŋāĻĒā§āĻā§āĻāĻžāĻ°ā§āĻ¨ā§āĻ¸āĻŋ āĻŽāĻžāĻ°ā§āĻā§āĻā§ āĻŽā§āĻ˛ā§āĻ¯ āĻšā§āĻ°āĻžāĻ¸ āĻŦāĻž āĻ¸ā§āĻĨāĻŦāĻŋāĻ°āĻ¤āĻž āĻāĻŦāĻ āĻ¨ā§āĻ¤āĻŋāĻŦāĻžāĻāĻ āĻ āĻ¨ā§āĻā§āĻ¤āĻŋāĻ° āĻāĻ...