> analogous to how a secure VM can go faster with a JIT while still maintaining security
…what? You can’t JIT your way out of the underlying machine being slow. The machine is a watch; JITs typically achieve performance by speeding up an interpreter running on the machine (in other words, taking advantage of missed performance opportunities).
This analogy doesn’t work for POW schemes, since wasting energy is the entire point. My understanding of “L2” solutions is that they’re really just pseudo-verified batching techniques, where transactions are rolled up off-chain and settled in bulk. That doesn’t “solve” PoW; it fundamentally undermines the original integrity promise.
…what? You can’t JIT your way out of the underlying machine being slow. The machine is a watch; JITs typically achieve performance by speeding up an interpreter running on the machine (in other words, taking advantage of missed performance opportunities).
This analogy doesn’t work for POW schemes, since wasting energy is the entire point. My understanding of “L2” solutions is that they’re really just pseudo-verified batching techniques, where transactions are rolled up off-chain and settled in bulk. That doesn’t “solve” PoW; it fundamentally undermines the original integrity promise.