Layer 2 scaling solutions must inherit the underlying security of the main chain. Whereas sidechains may use other networks or validators to secure the chain, layer 2 differentiates itself by inheriting its security directly from the main chain .
Layer 2 scaling solutions must inherit the underlying security of the main chain. Whereas sidechains may use other networks or validators to secure the chain, layer 2 differentiates itself by inheriting its security directly from the main chain .