Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

![kaymanbit Avatar](https://lunarcrush.com/gi/w:24/cr:twitter::1448338485186899968.png) KAYMAN (Ø,G) 🍊,💊 [@kaymanbit](/creator/twitter/kaymanbit) on x XXX followers
Created: 2025-07-22 13:19:08 UTC

In my previous tweets I spoke about the L1 network. Now I will be writing on the L2 network and possibly the rollup structure of @tenprotocol 

📸 L2 Network
The L2 design aims to establish a decentralized network of nodes with valid Secure Enclave / TEEs, ensuring transaction confidentiality even amidst potential Secure Enclave / TEE breaches.

L2 Nodes: There are two primary categories of nodes within the TEN network:

Aggregator Nodes: These nodes, equipped with Secure Enclave / TEEs and the shared secret, can submit rollups to the L1. They process user transactions, roll them up, and submit them for inclusion in Ethereum blocks.

Verifier Nodes: These nodes, also equipped with Secure Enclave / TEEs and the shared secret, play a significant role in consensus security. They monitor the L1 network, calculating the state based on the submitted rollups.

📸 Rollup Data Structure
The Management Contract implements a blockchain-like structure to store the rollups. Each rollup references a parent rollup, and multiple competing sibling rollups can exist simultaneously. It's the responsibility of individual L2 nodes to determine the validity of these siblings.


XX engagements

![Engagements Line Chart](https://lunarcrush.com/gi/w:600/p:tweet::1947647601781743700/c:line.svg)

**Related Topics**
[categories](/topic/categories)
[decentralized](/topic/decentralized)

[Post Link](https://x.com/kaymanbit/status/1947647601781743700)

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

kaymanbit Avatar KAYMAN (Ø,G) 🍊,💊 @kaymanbit on x XXX followers Created: 2025-07-22 13:19:08 UTC

In my previous tweets I spoke about the L1 network. Now I will be writing on the L2 network and possibly the rollup structure of @tenprotocol

📸 L2 Network The L2 design aims to establish a decentralized network of nodes with valid Secure Enclave / TEEs, ensuring transaction confidentiality even amidst potential Secure Enclave / TEE breaches.

L2 Nodes: There are two primary categories of nodes within the TEN network:

Aggregator Nodes: These nodes, equipped with Secure Enclave / TEEs and the shared secret, can submit rollups to the L1. They process user transactions, roll them up, and submit them for inclusion in Ethereum blocks.

Verifier Nodes: These nodes, also equipped with Secure Enclave / TEEs and the shared secret, play a significant role in consensus security. They monitor the L1 network, calculating the state based on the submitted rollups.

📸 Rollup Data Structure The Management Contract implements a blockchain-like structure to store the rollups. Each rollup references a parent rollup, and multiple competing sibling rollups can exist simultaneously. It's the responsibility of individual L2 nodes to determine the validity of these siblings.

XX engagements

Engagements Line Chart

Related Topics categories decentralized

Post Link

post/tweet::1947647601781743700
/post/tweet::1947647601781743700