| | Adamantium [h] | Validity proof | Offchain (primary), onchain (fallback) | No | Yes | No |
@ -517,7 +517,7 @@ We can see in Table 5 how validity rollups are designed with a unique combinatio
| | Collateralized sidechain [o] | Collateralized multisig | Offchain | No | No | No |
| | Federated sidechain [p] | Federated multisig | Offchain | No | No | No |
| | Centralized sidechain [q] | Custodial | Offchain | No | No | No |
| | Zendoo[r] | Validity proof | Offchain with onchain checkpoints | No | Maybe** | No |
| | Zendoo[r] | Validity proof | Offchain with onchain checkpoints | No | Maybe** | No |
> Table 5 notes:
> [ * ] "Parent chain miners can steal" here refers to the idea that if enough parent chain block producers aka "miners" collude then they can steal money from users of the protocol in question without either the cooperation of the user being stolen from (as would be necessary if they were censoring and extoring the user) or needing to re-org a parent chain block (as would be necessary if they were double-spend attacking the user). See also <ahref="https://lightco.in/2021/06/21/miners-can-steal/"target="_blank">https://lightco.in/2021/06/21/miners-can-steal/</a>