Security is the core issue that all blockchain projects cannot avoid.

Most Layer-2 networks compromise on security in pursuit of speed — their finality of state relies on Ethereum validators, but is almost unrelated to Bitcoin's security system.

@Hemi The emergence of this is intended to break this single-chain security dependence. It anchors its security layer to Bitcoin through a mechanism called PoP (Proof-of-Proof), allowing Layer-2 to also achieve Bitcoin-level security.

1. What is PoP

PoP, short for Proof-of-Proof, is the core security protocol of Hemi.

Simply put, it is a 'security inheritance mechanism': Hemi's blocks will periodically submit summary information (such as block header hashes) to the Bitcoin main chain, and once this record is confirmed by a BTC block, the corresponding state of Hemi obtains the same security endorsement as Bitcoin. This design does not modify Bitcoin itself but utilizes the immutability characteristic of BTC.

Because anyone who wants to attack Hemi's historical records must simultaneously attack the Bitcoin chain—this is nearly impossible in reality. The existence of PoP has made Hemi the first modular Layer-2 network based on Bitcoin's security.

2. Why borrow strength from Bitcoin

Bitcoin is the most secure blockchain in the entire network, and its computing power dominates the entire cryptocurrency industry.

However, this security could only belong to Bitcoin itself in the past.

Other public chains or Layer-2 wanting similar guarantees must either replicate Bitcoin's mechanism (which is extremely costly) or rely on Ethereum's consensus (which has a lower security threshold).

The purpose of Hemi using PoP is to allow Bitcoin's security to be 'inherited'.

It does not change the rules of BTC, nor does it require Bitcoin nodes to participate; it simply establishes cryptographic anchor points between the two chains by periodically submitting states.

In this way, every confirmation data from Hemi comes with a Bitcoin-level security certificate.

3. The working principle of PoP

The operation process of PoP can be divided into three stages:

1. State summary generation

Hemi generates a state snapshot after a certain number of blocks, containing the current block header hash, Merkle root, verification signatures, and other summary information.

2. Submit to the Bitcoin main chain

PoP submitters in the network write this summary information into Bitcoin transactions.

This is usually achieved through Bitcoin's OP_RETURN operation, which embeds a small amount of data in BTC transactions.

3. Generate security anchor points

Once the Bitcoin transaction is packed into a BTC block, the corresponding batch of states from Hemi is permanently locked.

As long as this transaction exists on the BTC main chain, anyone can verify the correctness and immutability of Hemi's state.

Once the submission is completed, Hemi's corresponding state is considered 'superfinalized'.

4. The significance of 'Superfinality'

In traditional Layer-2, finality means that a transaction is irreversible once confirmed by the main chain.

But Hemi's PoP provides stronger guarantees—superfinality.

Once Hemi's state is anchored to the Bitcoin main chain, to roll back that transaction, it is necessary to roll back the BTC block itself.

And the security of Bitcoin's computing power is almost impossible to be reorganized, which gives Hemi's data a stronger resistance to attacks than Ethereum.

In other words, Hemi's security relies not only on its own validators but also inherits the consensus stability of the Bitcoin network.

5. The economic incentive mechanism of PoP

Hemi's PoP network consists of a group of validators and submitters.

Their task is to regularly package states, generate summaries, and send them to the Bitcoin chain.

To this end, the system has designed economic incentives:

Submitters need to pay Bitcoin transaction fees but will receive Hemi's block rewards or staking yields.

These incentives are distributed to ensure the continuous operation of the system.$HEMI distribution ensures the system continues to run.

This economic model makes security submission a self-sustaining mechanism rather than a centralized maintenance.

6. The balance between latency and cost

The security of PoP is extremely high, but it is not cost-free.

Each state submission incurs a transaction fee in BTC and waits for confirmation from the Bitcoin network.

This means that the final confirmation of the security layer may have some delay.

Hemi's approach is a dual confirmation mechanism:

  • Layer-2 provides quick settlement;

  • The PoP layer provides ultimate security.

This allows users to enjoy a near real-time experience while the system as a whole still possesses Bitcoin-level protection.

7. The synergy between PoP and modular architecture

In Hemi's modular system, PoP is part of the security module and can be upgraded or expanded independently.

In the future, when other chains wish to access Bitcoin's security, they can directly reuse Hemi's PoP module.

This means that Hemi may evolve into a 'Security-as-a-Service' platform, providing a security layer for the entire multi-chain ecosystem.

This is also one of the reasons Hemi is called the 'Super Protocol'—it not only self-protects but also provides security capabilities for other chains.

8. Conclusion

The PoP consensus mechanism makes Hemi the first truly 'Bitcoin-secured' Layer-2 network.

It transforms Bitcoin's computing power protection into Layer-2's finality guarantee,

ensuring that transactions can maintain speed while achieving the highest level of security.

Through this mechanism, Hemi redefines the boundaries of security:

Security is no longer just a private resource of a certain chain, but a capability that can be shared.

In the modular era, this security inheritance mechanism may become the standard configuration for blockchains,

and Hemi has already taken a step ahead.#Hemi $HEMI