End users can connect with solidity code and make traces (state transformations). Then the traces are sent on the CPU circuit which verifies the point out updates are right recursively (or in parallel) as well as just one succinct evidence. Third, Scroll introduces Layer two mining, strong and permissionless mining https://www.scrollbridge.com/