![](https://i.imgur.com/D2iXM1i.png =100x) ## Taiko ZK-EVM: Inheriting Layer 1 Security Dave | d1onys1us \ Developer Experience @ Taiko Labs --- ### Topics - Defining security - Taiko overview - Where should users be careful - How can we improve user security --- ## Defining security --- ### Defining security - User centric definition: - Failing to meet the trust assumptions about the system - What is trustless and trust-minimized - Bounded to a domain --- ## Taiko overview --- ### Background to Taiko - A decentralized Ethereum-equivalent ZK-Rollup - Community ZK-EVM effort - Released an alpha-1 testnet, alpha-2 coming soon 👀 --- ### What's inherited from Ethereum - Ethereum architecture - Execution clients - Gas costs, state trees, hashes, etc. - Validity rules - Consensus and data availability - Decentralization and open source - A platform for building (eg. the bridge) --- ## Taiko protocol walkthrough --- ### Proposing ![](https://i.imgur.com/ukSXMJt.png =500x) --- ### Proving ![](https://i.imgur.com/ums9sbn.png =500x) --- ### Verifying ![](https://i.imgur.com/g8q1EjJ.png =500x) --- ### Constructing the rollup state ![](https://i.imgur.com/nPg7qKO.png =250x) --- ## Where should users be careful --- ### Where should users be careful - Placing trust - Bridges - Permissioned override / upgrade - Correctness - Bug in proof system - Bug in the client - Smart contract behavior - Rollup context differences - L2 nodes are a new actor - Liveliness of chain --- ## How can we improve user security --- ### How can we improve user security - Staying user centric - Easy to use tools - Education - Do it themself - Governance - Diversity and collaboration - Diversity in implementation (eg. multi-proof, multi-client) - Collaboration on neutral interfaces (eg. L2Beat) --- ### Thank you <div style="text-align:center;"> <figure style="display:inline-block; margin:0 20px;"> <img src="https://i.imgur.com/N8Gea6F.png" width="150" height="150"> <figcaption>Follow on Twitter</figcaption> </figure> <figure style="display:inline-block; margin:0 20px;"> <img src="https://i.imgur.com/WdMDAIt.png" width="150" height="150"> <figcaption>Read the docs</figcaption> </figure> <figure style="display:inline-block; margin:0 20px;"> <img src="https://i.imgur.com/ZICbVK8.png" width="150" height="150"> <figcaption>These slides</figcaption> </figure> </div> <br /> | | | |--|--| |**Discord**|https://discord.gg/taikoxyz| |**Docs**|https://taiko.xyz| |**GitHub**|https://github.com/taikoxyz| |**Twitter**|https://twitter.com/taikoxyz| |**Contact me**|https://twitter.com/indraynor| <style> .reveal { font-size: 24px; } </style>
{"metaMigratedAt":"2023-06-17T22:21:41.454Z","metaMigratedFrom":"YAML","title":"Taiko ZK-EVM: Inheriting Layer 1 Security","breaks":"true","description":"Taiko talk on security"}
    474 views