A community for the latest discussions about the cutting edge of crypto design, it's culture and significant crypto news. Decentralize everything.
Check out our [Community Guidelines](https://relevant.community/crypto/post/6122269e61d1cd005a877277/62427d3ed587ad005b647828)
A community for the latest discussions about the cutting edge of crypto design, it's culture and significant crypto news. Decentralize everything.
Check out our [Community Guidelines](https://relevant.community/crypto/post/6122269e61d1cd005a877277/62427d3ed587ad005b647828)
>"There’s a difficult truth which often doesn’t come up when discussing layer 2 (L2) protocols: Every major L2 project has a trusted party which can execute protocol upgrades. Currently, this is the…"
>"There’s a difficult truth which often doesn’t come up when discussing layer 2 (L2) protocols: Every major L2 project has a trusted party which can execute protocol upgrades. Currently, this is the…"