Verifiable Data Availability
Ensures L2 Transaction Data Accessibility: Guarantees that all necessary L2 transaction data (or state differences) has been published in a way that it can be retrieved by any interested party.
Critical for Rollup Security & Trustlessness: Allows anyone to reconstruct the L2 state from the published data, which is essential for validating state transitions, submitting fraud proofs (in optimistic rollups), or ensuring users can always exit the L2.
Prevents Data Withholding Attacks: Protects against malicious L2 operators who might try to hide data to conceal invalid state changes, censor specific transactions, or prevent users from proving ownership of their assets.
Often Anchored to Layer 1: Typically achieved by posting L2 transaction data (often compressed) or cryptographic commitments to this data (along with proofs of availability) onto the highly secure Layer 1 blockchain.