![](https://i.imgur.com/D2iXM1i.png =100x)
## Taiko ZK-EVM: Inheriting Layer 1 Security
Dave | d1onys1us \
Developer Experience @ Taiko Labs
---
### Topics
- Defining security
- Taiko overview
- Where should users be careful
- How can we improve user security
---
## Defining security
---
### Defining security
- User centric definition:
- Failing to meet the trust assumptions about the system
- What is trustless and trust-minimized
- Bounded to a domain
---
## Taiko overview
---
### Background to Taiko
- A decentralized Ethereum-equivalent ZK-Rollup
- Community ZK-EVM effort
- Released an alpha-1 testnet, alpha-2 coming soon 👀
---
### What's inherited from Ethereum
- Ethereum architecture
- Execution clients
- Gas costs, state trees, hashes, etc.
- Validity rules
- Consensus and data availability
- Decentralization and open source
- A platform for building (eg. the bridge)
---
## Taiko protocol walkthrough
---
### Proposing
![](https://i.imgur.com/ukSXMJt.png =500x)
---
### Proving
![](https://i.imgur.com/ums9sbn.png =500x)
---
### Verifying
![](https://i.imgur.com/g8q1EjJ.png =500x)
---
### Constructing the rollup state
![](https://i.imgur.com/nPg7qKO.png =250x)
---
## Where should users be careful
---
### Where should users be careful
- Placing trust
- Bridges
- Permissioned override / upgrade
- Correctness
- Bug in proof system
- Bug in the client
- Smart contract behavior
- Rollup context differences
- L2 nodes are a new actor
- Liveliness of chain
---
## How can we improve user security
---
### How can we improve user security
- Staying user centric
- Easy to use tools
- Education
- Do it themself
- Governance
- Diversity and collaboration
- Diversity in implementation (eg. multi-proof, multi-client)
- Collaboration on neutral interfaces (eg. L2Beat)
---
### Thank you
<div style="text-align:center;"> <figure style="display:inline-block; margin:0 20px;">
<img src="https://i.imgur.com/N8Gea6F.png" width="150" height="150">
<figcaption>Follow on Twitter</figcaption>
</figure>
<figure style="display:inline-block; margin:0 20px;">
<img src="https://i.imgur.com/WdMDAIt.png" width="150" height="150">
<figcaption>Read the docs</figcaption>
</figure>
<figure style="display:inline-block; margin:0 20px;">
<img src="https://i.imgur.com/ZICbVK8.png" width="150" height="150">
<figcaption>These slides</figcaption>
</figure>
</div>
<br />
| | |
|--|--|
|**Discord**|https://discord.gg/taikoxyz|
|**Docs**|https://taiko.xyz|
|**GitHub**|https://github.com/taikoxyz|
|**Twitter**|https://twitter.com/taikoxyz|
|**Contact me**|https://twitter.com/indraynor|
<style>
.reveal {
font-size: 24px;
}
</style>
{"metaMigratedAt":"2023-06-17T22:21:41.454Z","metaMigratedFrom":"YAML","title":"Taiko ZK-EVM: Inheriting Layer 1 Security","breaks":true,"description":"Taiko talk on security","contributors":"[{\"id\":\"2435332b-f6a2-41d6-a459-c558af9bc6e3\",\"add\":2922,\"del\":10}]"}