[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]  KAYMAN (Ø,G) 🍊,💊 [@kaymanbit](/creator/twitter/kaymanbit) on x XXX followers Created: 2025-07-22 13:19:08 UTC In my previous tweets I spoke about the L1 network. Now I will be writing on the L2 network and possibly the rollup structure of @tenprotocol 📸 L2 Network The L2 design aims to establish a decentralized network of nodes with valid Secure Enclave / TEEs, ensuring transaction confidentiality even amidst potential Secure Enclave / TEE breaches. L2 Nodes: There are two primary categories of nodes within the TEN network: Aggregator Nodes: These nodes, equipped with Secure Enclave / TEEs and the shared secret, can submit rollups to the L1. They process user transactions, roll them up, and submit them for inclusion in Ethereum blocks. Verifier Nodes: These nodes, also equipped with Secure Enclave / TEEs and the shared secret, play a significant role in consensus security. They monitor the L1 network, calculating the state based on the submitted rollups. 📸 Rollup Data Structure The Management Contract implements a blockchain-like structure to store the rollups. Each rollup references a parent rollup, and multiple competing sibling rollups can exist simultaneously. It's the responsibility of individual L2 nodes to determine the validity of these siblings. XX engagements  **Related Topics** [categories](/topic/categories) [decentralized](/topic/decentralized) [Post Link](https://x.com/kaymanbit/status/1947647601781743700)
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
KAYMAN (Ø,G) 🍊,💊 @kaymanbit on x XXX followers
Created: 2025-07-22 13:19:08 UTC
In my previous tweets I spoke about the L1 network. Now I will be writing on the L2 network and possibly the rollup structure of @tenprotocol
📸 L2 Network The L2 design aims to establish a decentralized network of nodes with valid Secure Enclave / TEEs, ensuring transaction confidentiality even amidst potential Secure Enclave / TEE breaches.
L2 Nodes: There are two primary categories of nodes within the TEN network:
Aggregator Nodes: These nodes, equipped with Secure Enclave / TEEs and the shared secret, can submit rollups to the L1. They process user transactions, roll them up, and submit them for inclusion in Ethereum blocks.
Verifier Nodes: These nodes, also equipped with Secure Enclave / TEEs and the shared secret, play a significant role in consensus security. They monitor the L1 network, calculating the state based on the submitted rollups.
📸 Rollup Data Structure The Management Contract implements a blockchain-like structure to store the rollups. Each rollup references a parent rollup, and multiple competing sibling rollups can exist simultaneously. It's the responsibility of individual L2 nodes to determine the validity of these siblings.
XX engagements
Related Topics categories decentralized
/post/tweet::1947647601781743700