OpenLayer
  • Introduction
    • About OpenLayer
    • Our Mission
    • Our Approach
      • Foundations
        • OpenNodes
        • Restaking
        • Validation services
          • What is OVC
          • How is it done
          • Why is it better
        • Infrastructure
      • Modular Design
        • Modular data source
        • Modular source of security
        • Modular validation
        • Modular data transformation
        • Modular interoperability
      • Lifecycle of a Request
  • Data Validation Light Paper
  • OpenLayer AVS
    • Why Data Layer
    • How OpenLayer Works
    • Crypto Security
      • Websession proofs
      • Parser execution
    • End User Participation
    • On Demand Security
    • Multi Token Staking
    • Zero Bridging Solutions
  • For Node Operators
  • For Developers
    • Public Data Streams
    • VRF (Verifiable Randomness)
    • User Personal Data Proving
  • Privacy Policy
Powered by GitBook
On this page
  1. Introduction
  2. Our Approach
  3. Foundations
  4. Validation services

Why is it better

  • Faster. Not only does the computation itself can be executed to a result faster (Running a ZKP on it usually renders hundreds of time of more computation cycles). The dispute period can be significantly shorter too because the fraud proof would be cryptographic and not manual.

  • Lower resource requirements. Along the same lines, running the optimistic execution requires much lower computation power and thus drops the barrier of hardware requirements significantly. This in turn allows much more end-user owned devices to join the network, which unlocks even more computing power.

  • Secure. All supported computation will be retroactively provable by anyone from anywhere. Further more, staked assets should alter the incentive curve, so no malicious behaviors would even be attempting as long as crypto economics are designed well.

This combines the brighter side of both worlds of Optimistic and ZK, where everything is run Optimistically but no one will put their staked assets at risk knowing that their behavior will be auditable via ZK proofs from anyone in the open network.

PreviousHow is it doneNextInfrastructure

Last updated 9 months ago