End users can connect with solidity code and make traces (state transformations). Then the traces are despatched to the CPU circuit which verifies the point out updates are proper recursively (or in parallel) along with a person succinct evidence. 3rd, Scroll introduces Layer 2 mining, sturdy and permissionless mining which https://www.scrollbridge.com/