DEV Community

Cover image for Vitalik Says L2s Need Something New. We Agree And We've Been Quietly Building It.
Chronos Vault
Chronos Vault Subscriber

Posted on

Vitalik Says L2s Need Something New. We Agree And We've Been Quietly Building It.

Last week, Vitalik Buterin posted something that made every L2 team reconsider their roadmap.

The summary: L2s as "branded shards" of Ethereum is over. L1 is scaling on its own. Gas limits are projected to increase significantly in 2026. If your L2 is just another EVM chain with an optimistic bridge, you're building something the ecosystem no longer needs.

His exact words: "We don't friggin need more copypasta EVM chains."

We've been building Trinity Protocol for a while now a multi chain consensus verification system deployed across Arbitrum, Solana, and TON. When Vitalik's post dropped, the first question from our community was: "Does this affect you?"

The short answer: No. The longer answer is more interesting.

This post is a transparent engineering analysis of how Vitalik's new L2 framework applies to our protocol, what we'd change, what we wouldn't, and what we think the future actually looks like for multi-chain security infrastructure.


What Vitalik Actually Said

Three core arguments:

1. L1 Doesn't Need L2s for Scaling Anymore

Ethereum gas fees are already low. Gas limits will increase substantially in 2026. The original pitch "Ethereum can't handle the transactions, so we'll do it on L2" is becoming irrelevant.

2. L2s Failed the "Branded Shard" Vision

The original L2 thesis was that rollups would be like shards of Ethereum: block space "backed by the full faith and credit of Ethereum." But progress to Stage 2 has been slow. Some L2s have explicitly said they may never go beyond Stage 1. The vision didn't materialize.

3. L2s Should Bring Something New

Vitalik's specific examples of valuable differentiation:

  • Privacy
  • Application specific efficiency
  • Ultra low latency
  • Non EVM specialized VMs
  • Non financial applications (social, identity, AI)
  • Built in oracles or dispute resolution

His recommendation: "Don't just extend L1, figure out something new to add."

He also proposed a "native rollup precompile" a way for Ethereum to natively verify ZK-EVM proofs, making trustless interoperability accessible without security councils.


Where Trinity Protocol Sits

Let's be precise about what we are and what we aren't.

We are not an L2. We don't produce blocks. We don't run a sequencer. We don't compete with Arbitrum, Optimism, or Base for users.

We are cross chain consensus verification infrastructure. We require 2 out of 3 independent blockchains to agree before any critical operation proceeds.

The three chains:

  • Arbitrum EVM security, inheriting Ethereum's settlement guarantees
  • Solana Sub second finality, different consensus mechanism (Proof of History + Tower BFT)
  • TON Sharded architecture, quantum-resistant cryptography capabilities

Three different virtual machines (EVM, SVM, TVM). Three different programming languages (Solidity, Rust, FunC/Tact). Three different consensus mechanisms. Three completely independent attack surfaces.

To compromise a Trinity protected operation, an attacker would need to simultaneously exploit two of these three entirely different systems. Not difficult. Not expensive. Mathematically impractical.


The Honest L2 Dependency Audit

Since Vitalik's critique targets L2 dependency, I want to be fully transparent about what we actually depend on from Arbitrum as an L2.

What We Have Deployed

Arbitrum Sepolia 14 Verified Contracts:

Contract Address L2-Specific?
TrinityConsensusVerifier 0x59396D58Fa856025bD5249E342729d5550Be151C No — Standard EVM
HTLCChronosBridge 0xc0B9C6cfb6e39432977693d8f2EBd4F2B5f73824 No — Standard EVM
ChronosVaultOptimized 0xAE408eC592f0f865bA0012C480E8867e12B4F32D No — Standard EVM
EmergencyMultiSig 0x066A39Af76b625c1074aE96ce9A111532950Fc41 No — Standard EVM
TrinityKeeperRegistry 0xAe9bd988011583D87d6bbc206C19e4a9Bda04830 No — Standard EVM
TrinityGovernanceTimelock 0xf6b9AB802b323f8Be35ca1C733e155D4BdcDb61b No — Standard EVM
CrossChainMessageRelay 0xC6F4f855fc690CB52159eE3B13C9d9Fb8D403E59 No — Standard EVM
TrinityRelayerCoordinator 0x4023B7307BF9e1098e0c34F7E8653a435b20e635 No — Standard EVM
TrinityFeeSplitter 0x4F777c8c7D3Ea270c7c6D9Db8250ceBe1648A058 No — Standard EVM
TrinityShieldVerifierV2 0xf111D291afdf8F0315306F3f652d66c5b061F4e3 No — Standard EVM
TrinityShieldVerifier 0x2971c0c3139F89808F87b2445e53E5Fb83b6A002 No — Standard EVM (deprecated)
TestERC20 0x4567853BE0d5780099E3542Df2e00C5B633E0161 No — Standard EVM
HTLCArbToL1 0xaDDAC5670941416063551c996e169b0fa569B8e1 YES — Uses ArbSys.sendTxToL1()
TrinityExitGateway 0xE6FeBd695e4b5681DCF274fDB47d786523796C04 No — Designed for L1

The result: 12 of 14 contracts are standard EVM. They use OpenZeppelin v5.4.0 libraries (ReentrancyGuard, SafeERC20, ECDSA, MerkleProof, Ownable, Pausable, ERC4626). They could deploy on Ethereum L1 today with zero code changes.

Only 1 contract is Arbitrum-specific: HTLCArbToL1.sol uses the ArbSys precompile interface for L2-to-L1 messaging:

interface ArbSys {
    function sendTxToL1(address destination, bytes calldata data) 
        external payable returns (uint256);
}
Enter fullscreen mode Exit fullscreen mode

This precompile enables our Exit-Batch system, where a Keeper collects 50-200 exit requests on L2, builds a Merkle tree, and submits one batch to L1. This saves users 89-97% on gas compared to individual L1 transactions.

1 contract is already L1-native: TrinityExitGateway.sol is labeled "L1 Settlement Layer" in its own documentation. It receives batched exits from Arbitrum with Trinity 2-of-3 consensus validation.

Why We Chose Arbitrum

We didn't choose Arbitrum because we needed an L2 to scale. We chose it because:

  1. Gas efficiency for high frequency operations. A createHTLC() call costs ~$0.81 on Arbitrum Sepolia vs ~$8-15 on Ethereum L1. For a protocol that processes many cross-chain consensus operations, this cost difference is meaningful.

  2. We needed a third chain with different technology from Solana and TON. Our security model requires technology diversity. Arbitrum gave us EVM security with Ethereum settlement guarantees while being a genuinely different execution environment from Solana's SVM or TON's TVM.

  3. Mature ecosystem. Arbitrum has the largest TVL of any L2, the most battle-tested infrastructure, and the strongest developer tooling.


Scoring Against Vitalik's Framework

Vitalik gave three recommendations. Let's grade ourselves honestly.

"Identify a value add other than scaling"

Our value add: Multi-chain consensus verification.

This is fundamentally impossible on a single chain, whether L1 or L2. Technology diversity requires multiple independent systems. Our 2 of 3 consensus provides a security guarantee that no amount of L1 scaling can replicate.

Additionally:

  • 184 Lean 4 formal proofs Every major security property mathematically proven, zero sorry placeholders
  • Hardware TEE isolation Intel SGX and AMD SEV enclaves via Trinity Shield (custom Rust implementation)
  • Quantum-resistant cryptography — ML-KEM-1024 and CRYSTALS-Dilithium-5 via TON integration
  • 22 specialized vault types From simple time locks to ERC-4626 investment vaults to zero-knowledge privacy vaults
  • 8-layer Mathematical Defense Layer ZK proofs, formal verification, MPC key management, VDF time-locks, AI anomaly detection, post-quantum crypto, multi-chain consensus, and hardware TEE

None of this is "scaling." This is security infrastructure that doesn't exist elsewhere.

Grade: Strong pass.

"Be Stage 1 at minimum"

We deploy on Arbitrum, which is actively progressing toward Stage 2. We inherit Arbitrum's security guarantees for our EVM contracts.

But here's the important distinction: our security model doesn't solely depend on any single chain's rollup status. Even if Arbitrum's bridge had a vulnerability, our consensus requires Solana AND TON to independently agree. The L2 is one validator of three.

This is defense in depth by design.

Grade: Pass, with the caveat that our security exceeds what any single chain provides.

"Support maximum interoperability"

Our contracts are built on:

  • Standard OpenZeppelin v5.4.0 libraries
  • Standard ERC-4626 vault interface
  • Standard ECDSA signature verification
  • Standard Merkle proof validation
  • Standard Solidity interfaces (ITrinityConsensusVerifier, IChronosVault, IHTLC, ITrinityBatchVerifier)

12 of 14 contracts are portable to any EVM chain. The libraries (CircuitBreakerLib, ConsensusProposalLib, FeeAccounting, OperationLifecycle, ProofValidation) are pure Solidity with no chain specific dependencies.

Grade: Strong pass.


The Technical Deep Dive: What Would L1 Migration Look Like?

If Ethereum L1 gas drops enough, here's what a migration to L1 would actually involve:

No Changes Needed (12 contracts)

Every contract except HTLCArbToL1 and TrinityExitGateway can deploy on L1 as-is. The Solidity code doesn't reference Arbitrum anywhere. Same bytecode, different chain.

Remove or Adapt (2 contracts)

  • HTLCArbToL1 This contract's entire purpose is batching L2 exits to L1. If you're already on L1, you don't need L2-to-L1 messaging. This contract becomes unnecessary.
  • TrinityExitGateway Already designed for L1, but only needed for receiving batched L2 exits. Without HTLCArbToL1 sending batches, this contract simplifies dramatically.

What Stays the Same

  • All 184 Lean 4 proofs remain valid (they prove logical properties, not chain-specific behavior)
  • All 4 Solana programs remain unchanged
  • All 3 TON contracts remain unchanged
  • Trinity Shield (Rust TEE) is chain independent
  • All ZK circuits (Groth16, vault ownership, multisig verification) are chain-independent
  • The SDK's Arbitrum provider would point to L1 instead a configuration change

Estimated Effort

2-3 days of engineering. Not a rewrite. A redeployment.


The Native Rollup Precompile: Why It Helps Us

Vitalik proposed a native rollup precompile that verifies ZK-EVM proofs as part of Ethereum itself. This would:

  1. Auto-upgrade along with Ethereum
  2. Hard-fork to fix bugs (no security council needed)
  3. Make "EVM plus other stuff" verification accessible

This is directly relevant to Trinity Protocol.

We already use Groth16 ZK-SNARKs:

  • Groth16Verifier.sol — Core ZK proof verification
  • ZKConsensusVerifier.sol — Consensus with ZK proofs
  • vault_ownership_v2.circom — Private vault ownership proof
  • multisig_verification_v2.circom — ZK multisig verification

If Ethereum enshrines ZK-EVM verification, our proofs become:

  • Cheaper to verify on-chain
  • More trustless (no security council for the verifier)
  • Compatible with Vitalik's "bring your own prover for the other stuff" model

Our "other stuff" the multi-chain consensus layer, the hardware TEE attestation, the quantum-resistant components would plug into the native rollup precompile while bringing genuinely new capabilities.

Vitalik's roadmap doesn't threaten our architecture. It improves it.


The Broader Ecosystem Implications

What Dies

Generic EVM rollups with nothing differentiated. If your entire value proposition is "cheaper EVM transactions," L1 scaling will eat your lunch.

Vitalik explicitly called out "forking Compound" as governance theater and "making another EVM chain with an optimistic bridge" as infrastructure copypasta. Both are dead ends.

What Survives

Chains that bring genuinely new capabilities:

  • Privacy infrastructure ZK-based chains that enable private transactions while maintaining compliance options
  • Application-specific chains Optimized for specific use cases (prediction markets, gaming, social)
  • Cross-chain security Multi-chain verification systems (this is us)
  • Non-EVM computation Chains that offer different programming models
  • Ultra-low latency For use cases where even a scaled L1 isn't fast enough

The Spectrum Model

Vitalik's spectrum from "full faith and credit of Ethereum" to "loosely connected chain" is more honest than the current binary of "L2" vs "alt-L1."

Trinity Protocol exists across this spectrum:

  • Our EVM contracts are deeply connected to Ethereum (via Arbitrum or directly on L1)
  • Our Solana programs operate on a separate chain with bridge verification
  • Our TON contracts operate on yet another chain with independent consensus

We're not trying to be Ethereum. We're trying to use Ethereum (and Solana, and TON) to create a security guarantee that no single chain can provide alone.


What We Think Actually Matters

After spending a long time deep in this problem, here's what we believe:

1. Technology Diversity Is Security

Same technology = same vulnerabilities. If you run three EVM chains, a Solidity compiler bug affects all three. If you run EVM + SVM + TVM, an exploit that works on one is useless against the other two.

This is why we use three different chains with three different tech stacks. Not because we love complexity. Because security demands it.

2. Mathematical Proofs Beat Audit Reports

We have 184 Lean 4 theorems. Every one compiles. Zero sorry placeholders.

We also have:

  • 23 Echidna invariant properties
  • 54 Halmos symbolic execution properties
  • 140+ SMTChecker compile-time assertions
  • 5 custom Slither detectors
  • TLA+ model checking specifications

That's over 400 verified properties across our codebase.

An audit report says "we looked and didn't find anything." A mathematical proof says "this property holds for ALL possible inputs." Those are fundamentally different guarantees.

3. Hardware Isolation Is Non-Negotiable

Trinity Shield runs validator signing operations inside Intel SGX and AMD SEV enclaves. The keys never exist in normal memory. Even if a validator's server is completely compromised root access, everything the signing keys remain protected.

Our on-chain verification contract (TrinityShieldVerifierV2 at 0xf111D291afdf8F0315306F3f652d66c5b061F4e3) validates TEE attestations, providing cryptographic proof that the signing happened inside genuine hardware enclaves.

This protection works regardless of which chain the contracts run on. L1, L2, doesn't matter. The hardware isolation is chain independent.

4. Quantum Resistance Is Not Optional

Google's Willow chip is demonstrating quantum computing progress. NIST has finalized post quantum standards. The question isn't "if" but "when" current encryption breaks.

Our TON integration uses ML-KEM-1024 for key encapsulation and CRYSTALS-Dilithium-5 for digital signatures. Both are NIST-approved post-quantum algorithms.

Assets protected by Trinity Protocol today will remain protected when quantum computers mature. That's a guarantee most protocols can't make.


Our Roadmap After Vitalik's Post

What Doesn't Change

  • 2-of-3 consensus across three chains (this IS the product)
  • Formal verification requirements (non-negotiable)
  • Security audit requirements before mainnet (we don't cut corners)
  • Hardware TEE architecture (chain-independent)

What We're Evaluating

  • Dual deployment option: L2 (Arbitrum) for cost-sensitive operations, L1 (Ethereum) for maximum-trust operations. Users choose their security/cost tradeoff.
  • L1 gas monitoring: If Ethereum gas drops as projected in 2026, shifting primary operations to L1 becomes economically viable.
  • Native rollup precompile integration: If Ethereum enshrines ZK-EVM verification, we'll integrate our ZK circuits with the precompile for cheaper, more trustless proof verification.

What We Won't Do

  • Panic migrate away from Arbitrum
  • Abandon our L2 deployment without a clear gas-efficiency reason
  • Rebrand as "L1 native" for marketing purposes when our architecture genuinely spans multiple chains

Vibes match substance. That's the rule.


Current State

We're on testnet. Everything is deployed and verifiable:

Arbitrum Sepolia: 14 contracts verified on chain
Solana Devnet: 4 programs deployed
TON Testnet: 3 contracts deployed
Formal Verification: 184 theorems, 400+ total properties

We're pursuing security audits across all three chains before mainnet deployment. We don't have a mainnet date because we don't set dates we can't guarantee.

When it's ready, every contract address will be published, every proof will be verifiable, and every claim in this post will be auditable on-chain.


For Other Builders

If Vitalik's post scared you, ask yourself one question:

What does my project do that L1 can't?

If the answer is "cheaper transactions" yes, you should be worried. L1 is scaling.

If the answer involves genuinely new capabilities privacy, cross chain verification, application specific computation, non EVM paradigms you're building in the right direction.

The L2 ecosystem will consolidate. Generic rollups will struggle. But specialized infrastructure that does things L1 cannot will become more valuable, not less.

Build something new. Prove it works. Ship when it's ready.


Links


Trust math, not humans.

Top comments (1)

Collapse
 
tanelith profile image
Emir Taner

Thank you for sharing!