-
Notifications
You must be signed in to change notification settings - Fork 452
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix typo #922
base: main
Are you sure you want to change the base?
fix typo #922
Conversation
fix typo
fix typo
fix typo
fix typo
fix typo
fix typo
fix typo
@samdotola is attempting to deploy a commit to the Consensys Team on Vercel. A member of the Team first needs to authorize it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this @samdotola! Many good suggestions, but also some that I've reverted to their existing state.
- `LineaRollup`: Introduce more granular pausing and an additional verifier unsetting role | ||
- `L2MessageService`: Introduce more granular pausing | ||
- `TokenBridge`: Previously, all administration functions were managed by a single owner (multisig) | ||
role. The update adds role-based access with more granular roles per function, particularly for | ||
pausing. | ||
- Remove `finalizeBlocksWithoutProof` function | ||
- The function enabled finalization without proofs. This allowed network activity to continue | ||
- The function enabled finalization without proof. This allowed network activity to continue |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- The function enabled finalization without proof. This allowed network activity to continue | |
- The function enabled finalization without proofs. This allowed network activity to continue |
@@ -197,5 +197,5 @@ As outlined above, you can adjust the display size of the svg by changing the cl | |||
|
|||
### Social cards | |||
|
|||
A social card for any new article(s) will be generated and applied when the site builds, so there | |||
A social card for any new article(s) will be generated and applied when the site is built so there |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A social card for any new article(s) will be generated and applied when the site is built so there | |
A social card for any new article(s) will be generated and applied when the site builds so there |
@@ -5,7 +5,7 @@ image: /img/socialCards/overview.jpg | |||
--- | |||
|
|||
Linea is a secure, low-cost, and Ethereum-equivalent layer 2 blockchain built to bring the world | |||
onchain without compromising on security and decentralization. | |||
on-chain without compromising on security and decentralization. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
on-chain without compromising on security and decentralization. | |
onchain without compromising on security and decentralization. |
onchain
is our preferred usage
@@ -61,7 +61,7 @@ import { config } from './wagmi' // path your wagmi.ts config file | |||
:::info TanStack Query | |||
|
|||
TanStack Query, formerly known as React Query, is a library that adds state management for the | |||
onchain data your dapp requests from the blockchain using Wagmi hooks. It's not essential, but | |||
on-chain data your dapp requests from the blockchain using Wagmi hooks. It's not essential, but |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
on-chain data your dapp requests from the blockchain using Wagmi hooks. It's not essential, but | |
onchain data your dapp requests from the blockchain using Wagmi hooks. It's not essential, but |
through an offchain gateway, Linea ENS domains resolve on L1. | ||
limited to one per account, and registering requires completion of [Proof of Humanity](https://poh.linea.build/). | ||
As the system leverages CCIP Read, which enables L1 to seamlessly query the Linea ENS registry | ||
through an off-chain gateway, Linea ENS domains resolve on L1. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
through an off-chain gateway, Linea ENS domains resolve on L1. | |
through an offchain gateway, Linea ENS domains resolve on L1. |
@@ -55,7 +55,7 @@ Data availability is one of the ways in which a [L2](#layer-2) differs from a [s | |||
|
|||
### elliptic curve cryptography | |||
|
|||
A method of encrypting information used in many applications, including in public blockchain networks. It is commonly used to create "public-private key pairs": a pair of cryptographic elements. The public key can be used to encrypt things which can then only be decrypted by the private key. | |||
A method of encrypting information is used in many applications, including in public blockchain networks. It is commonly used to create "public-private key pairs": a pair of cryptographic elements. The public key can be used to encrypt things which can then only be decrypted by the private key. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A method of encrypting information is used in many applications, including in public blockchain networks. It is commonly used to create "public-private key pairs": a pair of cryptographic elements. The public key can be used to encrypt things which can then only be decrypted by the private key. | |
A method of encrypting information used in many applications, including in public blockchain networks. It is commonly used to create "public-private key pairs": a pair of cryptographic elements. The public key can be used to encrypt things which can then only be decrypted by the private key. |
@@ -87,7 +87,7 @@ In optimistic rollups, fraud proofs (fault proofs) are the evidence a verifier p | |||
|
|||
gnark is a software library that offers users the ability to design and run computational circuits in zk-SNARKs through a high-level API. | |||
|
|||
The library is open source and developed under the Apache 2.0 license. | |||
The library is open-source and developed under the Apache 2.0 license. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The library is open-source and developed under the Apache 2.0 license. | |
The library is open source and developed under the Apache 2.0 license. |
Hyphenation unnecessary unless it's immediately before the noun it describes, which isn't the case here.
@@ -135,7 +135,7 @@ This is a computational entity or service that provides information or answers t | |||
|
|||
### Optimistic rollup | |||
|
|||
A rollup of transactions that use [fraud proofs](#fraud-proof) to offer increased [L2](#layer-2) transaction throughput while using the security provided by Mainnet ([L1](#layer-1)). Unlike Plasma, a similar [L2](#layer-2) solution, optimistic rollups can handle more complex transaction types – anything possible in the EVM. However, in order to release assets back on the L1, users must wait for a 7 day challenge period. Liquidity providers can help alleviate distributing L1 ETH immediately, but this relies on trust in the security of the provider, and doesn't provide a mechanism for transferring NFTs. | |||
A rollup of transactions that use [fraud proofs](#fraud-proof) to offer increased [L2](#layer-2) transaction throughput while using the security provided by Mainnet ([L1](#layer-1)). Unlike Plasma, a similar [L2](#layer-2) solution, optimistic rollups can handle more complex transaction types – anything possible in the EVM. However, in order to release assets back on the L1, users must wait for a 7-day challenge period. Liquidity providers can help alleviate distributing L1 ETH immediately, but this relies on trust in the security of the provider and doesn't provide a mechanism for transferring NFTs. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A rollup of transactions that use [fraud proofs](#fraud-proof) to offer increased [L2](#layer-2) transaction throughput while using the security provided by Mainnet ([L1](#layer-1)). Unlike Plasma, a similar [L2](#layer-2) solution, optimistic rollups can handle more complex transaction types – anything possible in the EVM. However, in order to release assets back on the L1, users must wait for a 7-day challenge period. Liquidity providers can help alleviate distributing L1 ETH immediately, but this relies on trust in the security of the provider and doesn't provide a mechanism for transferring NFTs. | |
A rollup of transactions that use [fraud proofs](#fraud-proof) to offer increased [L2](#layer-2) transaction throughput while using the security provided by Mainnet ([L1](#layer-1)). Unlike Plasma, a similar [L2](#layer-2) solution, optimistic rollups can handle more complex transaction types – anything possible in the EVM. However, in order to release assets back on the L1, users must wait for a seven-day challenge period. Liquidity providers can help alleviate distributing L1 ETH immediately, but this relies on trust in the security of the provider and doesn't provide a mechanism for transferring NFTs. |
|
||
## U | ||
|
||
## V | ||
|
||
### Validity proof | ||
|
||
A security model for certain [L2](#layer-2) solutions where, to increase speed, transactions are rolled up into batches and submitted to Ethereum in a single transaction. The transaction computation is done off-chain and then supplied to the main chain with a proof of their validity. This method increases the amount of transactions possible while maintaining security. Some rollups use [fraud proofs](#fraud-proof). | ||
A security model for certain [L2](#layer-2) solutions where to increase speed, transactions are rolled up into batches and submitted to Ethereum in a single transaction. The transaction computation is done off-chain and then supplied to the main chain with proof of their validity. This method increases the amount of transactions possible while maintaining security. Some rollups use [fraud proofs](#fraud-proof). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A security model for certain [L2](#layer-2) solutions where to increase speed, transactions are rolled up into batches and submitted to Ethereum in a single transaction. The transaction computation is done off-chain and then supplied to the main chain with proof of their validity. This method increases the amount of transactions possible while maintaining security. Some rollups use [fraud proofs](#fraud-proof). | |
A security model for certain [L2](#layer-2) solutions where to increase speed, transactions are rolled up into batches and submitted to Ethereum in a single transaction. The transaction computation is done offchain and then supplied to the main chain with proof of their validity. This method increases the amount of transactions possible while maintaining security. Some rollups use [fraud proofs](#fraud-proof). |
|
||
### Verifiable computation | ||
|
||
Verifiable computation allows a “weak computer” (Ethereum L1) to offload computation to a potentially untrusted, but “powerful computer” (Linea L2). The “powerful computer” must return a validity proof of the correctness of its results. Verifying the proof is cheaper than performing the computation from scratch. | ||
Verifiable computation allows a “weak computer” (Ethereum L1) to offload computation to a potentially untrusted, but “powerful computer” (Linea L2). The “powerful computer” must return a valid proof of the correctness of its results. Verifying the proof is cheaper than performing the computation from scratch. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Verifiable computation allows a “weak computer” (Ethereum L1) to offload computation to a potentially untrusted, but “powerful computer” (Linea L2). The “powerful computer” must return a valid proof of the correctness of its results. Verifying the proof is cheaper than performing the computation from scratch. | |
Verifiable computation allows a “weak computer” (Ethereum L1) to offload computation to a potentially untrusted, but “powerful computer” (Linea L2). The “powerful computer” must return a validity proof of the correctness of its results. Verifying the proof is cheaper than performing the computation from scratch. |
This changes the meaning -- validity proof
is intended here.
typo corrections