Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix typo #922

Open
wants to merge 7 commits into
base: main
Choose a base branch
from
Open

fix typo #922

wants to merge 7 commits into from

Conversation

samdotola
Copy link

typo corrections

Copy link

vercel bot commented Jan 7, 2025

@samdotola is attempting to deploy a commit to the Consensys Team on Vercel.

A member of the Team first needs to authorize it.

Copy link
Collaborator

@jlwllmr jlwllmr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for this @samdotola! Many good suggestions, but also some that I've reverted to their existing state.

- `LineaRollup`: Introduce more granular pausing and an additional verifier unsetting role
- `L2MessageService`: Introduce more granular pausing
- `TokenBridge`: Previously, all administration functions were managed by a single owner (multisig)
role. The update adds role-based access with more granular roles per function, particularly for
pausing.
- Remove `finalizeBlocksWithoutProof` function
- The function enabled finalization without proofs. This allowed network activity to continue
- The function enabled finalization without proof. This allowed network activity to continue
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- The function enabled finalization without proof. This allowed network activity to continue
- The function enabled finalization without proofs. This allowed network activity to continue

@@ -197,5 +197,5 @@ As outlined above, you can adjust the display size of the svg by changing the cl

### Social cards

A social card for any new article(s) will be generated and applied when the site builds, so there
A social card for any new article(s) will be generated and applied when the site is built so there
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
A social card for any new article(s) will be generated and applied when the site is built so there
A social card for any new article(s) will be generated and applied when the site builds so there

@@ -5,7 +5,7 @@ image: /img/socialCards/overview.jpg
---

Linea is a secure, low-cost, and Ethereum-equivalent layer 2 blockchain built to bring the world
onchain without compromising on security and decentralization.
on-chain without compromising on security and decentralization.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
on-chain without compromising on security and decentralization.
onchain without compromising on security and decentralization.

onchain is our preferred usage

@@ -61,7 +61,7 @@ import { config } from './wagmi' // path your wagmi.ts config file
:::info TanStack Query

TanStack Query, formerly known as React Query, is a library that adds state management for the
onchain data your dapp requests from the blockchain using Wagmi hooks. It's not essential, but
on-chain data your dapp requests from the blockchain using Wagmi hooks. It's not essential, but
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
on-chain data your dapp requests from the blockchain using Wagmi hooks. It's not essential, but
onchain data your dapp requests from the blockchain using Wagmi hooks. It's not essential, but

through an offchain gateway, Linea ENS domains resolve on L1.
limited to one per account, and registering requires completion of [Proof of Humanity](https://poh.linea.build/).
As the system leverages CCIP Read, which enables L1 to seamlessly query the Linea ENS registry
through an off-chain gateway, Linea ENS domains resolve on L1.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
through an off-chain gateway, Linea ENS domains resolve on L1.
through an offchain gateway, Linea ENS domains resolve on L1.

@@ -55,7 +55,7 @@ Data availability is one of the ways in which a [L2](#layer-2) differs from a [s

### elliptic curve cryptography

A method of encrypting information used in many applications, including in public blockchain networks. It is commonly used to create "public-private key pairs": a pair of cryptographic elements. The public key can be used to encrypt things which can then only be decrypted by the private key.
A method of encrypting information is used in many applications, including in public blockchain networks. It is commonly used to create "public-private key pairs": a pair of cryptographic elements. The public key can be used to encrypt things which can then only be decrypted by the private key.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
A method of encrypting information is used in many applications, including in public blockchain networks. It is commonly used to create "public-private key pairs": a pair of cryptographic elements. The public key can be used to encrypt things which can then only be decrypted by the private key.
A method of encrypting information used in many applications, including in public blockchain networks. It is commonly used to create "public-private key pairs": a pair of cryptographic elements. The public key can be used to encrypt things which can then only be decrypted by the private key.

@@ -87,7 +87,7 @@ In optimistic rollups, fraud proofs (fault proofs) are the evidence a verifier p

gnark is a software library that offers users the ability to design and run computational circuits in zk-SNARKs through a high-level API.

The library is open source and developed under the Apache 2.0 license.
The library is open-source and developed under the Apache 2.0 license.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The library is open-source and developed under the Apache 2.0 license.
The library is open source and developed under the Apache 2.0 license.

Hyphenation unnecessary unless it's immediately before the noun it describes, which isn't the case here.

@@ -135,7 +135,7 @@ This is a computational entity or service that provides information or answers t

### Optimistic rollup

A rollup of transactions that use [fraud proofs](#fraud-proof) to offer increased [L2](#layer-2) transaction throughput while using the security provided by Mainnet ([L1](#layer-1)). Unlike Plasma, a similar [L2](#layer-2) solution, optimistic rollups can handle more complex transaction types – anything possible in the EVM. However, in order to release assets back on the L1, users must wait for a 7 day challenge period. Liquidity providers can help alleviate distributing L1 ETH immediately, but this relies on trust in the security of the provider, and doesn't provide a mechanism for transferring NFTs.
A rollup of transactions that use [fraud proofs](#fraud-proof) to offer increased [L2](#layer-2) transaction throughput while using the security provided by Mainnet ([L1](#layer-1)). Unlike Plasma, a similar [L2](#layer-2) solution, optimistic rollups can handle more complex transaction types – anything possible in the EVM. However, in order to release assets back on the L1, users must wait for a 7-day challenge period. Liquidity providers can help alleviate distributing L1 ETH immediately, but this relies on trust in the security of the provider and doesn't provide a mechanism for transferring NFTs.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
A rollup of transactions that use [fraud proofs](#fraud-proof) to offer increased [L2](#layer-2) transaction throughput while using the security provided by Mainnet ([L1](#layer-1)). Unlike Plasma, a similar [L2](#layer-2) solution, optimistic rollups can handle more complex transaction types – anything possible in the EVM. However, in order to release assets back on the L1, users must wait for a 7-day challenge period. Liquidity providers can help alleviate distributing L1 ETH immediately, but this relies on trust in the security of the provider and doesn't provide a mechanism for transferring NFTs.
A rollup of transactions that use [fraud proofs](#fraud-proof) to offer increased [L2](#layer-2) transaction throughput while using the security provided by Mainnet ([L1](#layer-1)). Unlike Plasma, a similar [L2](#layer-2) solution, optimistic rollups can handle more complex transaction types – anything possible in the EVM. However, in order to release assets back on the L1, users must wait for a seven-day challenge period. Liquidity providers can help alleviate distributing L1 ETH immediately, but this relies on trust in the security of the provider and doesn't provide a mechanism for transferring NFTs.


## U

## V

### Validity proof

A security model for certain [L2](#layer-2) solutions where, to increase speed, transactions are rolled up into batches and submitted to Ethereum in a single transaction. The transaction computation is done off-chain and then supplied to the main chain with a proof of their validity. This method increases the amount of transactions possible while maintaining security. Some rollups use [fraud proofs](#fraud-proof).
A security model for certain [L2](#layer-2) solutions where to increase speed, transactions are rolled up into batches and submitted to Ethereum in a single transaction. The transaction computation is done off-chain and then supplied to the main chain with proof of their validity. This method increases the amount of transactions possible while maintaining security. Some rollups use [fraud proofs](#fraud-proof).
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
A security model for certain [L2](#layer-2) solutions where to increase speed, transactions are rolled up into batches and submitted to Ethereum in a single transaction. The transaction computation is done off-chain and then supplied to the main chain with proof of their validity. This method increases the amount of transactions possible while maintaining security. Some rollups use [fraud proofs](#fraud-proof).
A security model for certain [L2](#layer-2) solutions where to increase speed, transactions are rolled up into batches and submitted to Ethereum in a single transaction. The transaction computation is done offchain and then supplied to the main chain with proof of their validity. This method increases the amount of transactions possible while maintaining security. Some rollups use [fraud proofs](#fraud-proof).


### Verifiable computation

Verifiable computation allows a “weak computer” (Ethereum L1) to offload computation to a potentially untrusted, but “powerful computer” (Linea L2). The “powerful computer” must return a validity proof of the correctness of its results. Verifying the proof is cheaper than performing the computation from scratch.
Verifiable computation allows a “weak computer” (Ethereum L1) to offload computation to a potentially untrusted, but “powerful computer” (Linea L2). The “powerful computer” must return a valid proof of the correctness of its results. Verifying the proof is cheaper than performing the computation from scratch.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Verifiable computation allows a “weak computer” (Ethereum L1) to offload computation to a potentially untrusted, but “powerful computer” (Linea L2). The “powerful computer” must return a valid proof of the correctness of its results. Verifying the proof is cheaper than performing the computation from scratch.
Verifiable computation allows a “weak computer” (Ethereum L1) to offload computation to a potentially untrusted, but “powerful computer” (Linea L2). The “powerful computer” must return a validity proof of the correctness of its results. Verifying the proof is cheaper than performing the computation from scratch.

This changes the meaning -- validity proof is intended here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants