skyrock

1 posts

skyrock

skyrock

@Jinwei07

Katılım Temmuz 2017
137 Takip Edilen1 Takipçiler
skyrock
skyrock@Jinwei07·
@gluk64 @zksync So the assumption here is that the operator should use the official binary to execute transactions? Will zksync has the plan to move to permissionless manner? If that happens is there some mechanism to prevent or at least detect the malicious operators?
English
1
0
0
0
ALEX | ZK
ALEX | ZK@gluk64·
@Jinwei07 @zksync The proof must match the code, not only the inputs. Change of code => proof does not verify.
English
1
0
0
0