Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Guides

How to Establish a Data Availability Committee (DAC)

A technical guide for developers on implementing a DAC to secure Layer 2 transaction data. Covers committee formation, cryptographic proofs, and operational protocols.
Chainscore © 2026
introduction
IMPLEMENTATION GUIDE

How to Establish a Data Availability Committee (DAC)

A step-by-step guide for developers and network operators on architecting and deploying a Data Availability Committee to secure a Layer 2 or application-specific chain.

A Data Availability Committee (DAC) is a trusted group of entities responsible for storing and attesting to the availability of transaction data for a rollup or Layer 2 solution. Unlike pure data availability layers like Celestia or EigenDA, a DAC operates on a permissioned, multi-signature model. Its primary function is to provide a cryptographic guarantee—typically a collection of signatures—that the data necessary to reconstruct the chain state is available off-chain, enabling faster and cheaper withdrawals for users. This model is a foundational component for validiums and certain optimistic rollup designs where data is not posted to a base layer like Ethereum L1.

Establishing a DAC begins with defining its membership and governance. The committee should consist of 5-15 reputable, independent organizations to balance security with operational efficiency. Members can include crypto exchanges, staking providers, infrastructure companies, and respected developers. A clear governance framework is required to manage member onboarding, offboarding, and slashing conditions for malicious behavior. Tools like a multi-signature wallet (e.g., Safe) or a dedicated smart contract are used to manage the member set and aggregate signatures. The legal and incentive structure, often involving staking and rewards, must be formalized to ensure committee liveness.

The core technical implementation involves two systems: the DAC Node and the Attestation Smart Contract. Each committee member runs a DAC Node, a service that continuously monitors the rollup sequencer for new batches of transaction data. Upon receiving data, the node hashes it, stores it reliably (often using decentralized storage like IPFS or Arweave), and signs the resulting data hash. A standard interface for this node is defined, such as the one proposed by StarkWare for their SHARP prover. The signature collection process must be robust, often using a threshold signature scheme (like BLS) to create a single, compact attestation from multiple parties.

These signatures are then posted to an Attestation Contract deployed on the base layer (e.g., Ethereum). This contract verifies that a quorum (e.g., 4 out of 7) of the current committee's signatures are valid for a given data hash. The rollup's main bridge or state transition contract will check this attestation before processing withdrawals, ensuring data was available. Here's a simplified view of a contract function:

solidity
function verifyDAAttestation(
    bytes32 dataHash,
    bytes[] calldata signatures
) external view returns (bool) {
    // Recover signers from signatures
    // Check if signers are current DAC members
    // Verify a quorum of valid signatures is met
}

Operational security and monitoring are critical. Members must ensure high uptime and data redundancy, potentially replicating data across multiple geographical regions and storage backends. A watchdog service should be deployed to publicly monitor all DAC nodes, alerting if any member fails to sign available data or signs invalid data. The system must also plan for committee rotation—a periodic, trust-minimized process to refresh members without disrupting the network. This can be managed via the governance contract, with new members required to stake collateral before being added to the active set.

Finally, integration with the rollup stack completes the setup. The rollup sequencer must be configured to broadcast data blobs to all DAC node endpoints. The verifier or bridge contract must be upgraded to query the Attestation Contract. It's advisable to start with a testnet deployment, conducting rigorous failure simulations like member dropout and byzantine behavior. Successful DACs, such as those used by StarkEx applications (dYdX, ImmutableX), demonstrate that with careful design, a permissioned committee can provide a highly available and performant data layer, bridging the gap between centralized sequencing and fully decentralized data availability.

prerequisites
DATA AVAILABILITY COMMITTEES

Prerequisites and System Requirements

Before deploying a Data Availability Committee (DAC), ensure your system meets the technical, operational, and security prerequisites for a robust and trustworthy setup.

A Data Availability Committee (DAC) is a trusted group of entities responsible for storing and attesting to the availability of transaction data for a Layer 2 (L2) rollup. Unlike decentralized data availability layers like Celestia or EigenDA, a DAC operates on a permissioned, multi-signature model. The core prerequisite is defining the committee's purpose: to provide an economic and scalable data availability guarantee, ensuring that any verifier can reconstruct the L2 state if the primary sequencer fails. This model is commonly used by validium and certain optimistic rollup architectures to reduce costs while maintaining security assumptions distinct from posting all data directly to Ethereum L1.

The technical foundation requires a robust off-chain storage network. Each DAC member must operate a highly available node running the specific DAC client software, such as the one provided by StarkWare for StarkEx systems or a custom implementation using a framework like Polygon Avail's data availability API. Key system requirements include: - High-availability servers with 99.9%+ uptime SLAs - Redundant storage (often using IPFS, Arweave, or S3-compatible services with multi-region backups) - Sufficient bandwidth to handle the data blobs for every L2 batch - Secure signing infrastructure, typically Hardware Security Modules (HSMs) or cloud KMS, for generating attestations.

Committee composition and governance are critical prerequisites. You must select 5-20 reputable, independent organizations to act as members, balancing the need for decentralization with practical coordination. Each member requires a publicly verifiable identity and an established on-chain address for their signing key. The operational prerequisite is establishing a clear multi-signature threshold (e.g., 4-of-7 signatures) for attesting to data availability. This threshold defines the security model; the system must be designed so that data is considered available only when the requisite number of cryptographic signatures is submitted to the L1 smart contract.

From a development and integration standpoint, the L1 smart contract (the Verifier or Data Availability Challenge contract) must be deployed first. This contract defines the rules for accepting DAC attestations. The L2 sequencer must be configured to: 1. Post data commitments (e.g., Merkle roots) to the DAC nodes. 2. Receive signed attestations from the DAC. 3. Post the attestation signatures to the L1 contract. Prerequisite tooling includes monitoring and alerting systems for both sequencer and DAC members to detect liveness failures, and a disaster recovery process for data retrieval and signature reconstruction if a member goes offline.

key-concepts
DATA AVAILABILITY

Core Technical Concepts

Data Availability Committees (DACs) are a critical scaling solution that ensures data is published and accessible for off-chain transactions, enabling faster and cheaper Layer 2 networks.

01

What is a Data Availability Committee?

A Data Availability Committee (DAC) is a set of trusted, permissioned nodes responsible for attesting that transaction data for a Layer 2 rollup is available. Instead of posting all data on-chain (like Ethereum), the DAC signs cryptographic commitments. This reduces costs and increases throughput, but introduces a trust assumption that committee members will not collude to withhold data. Key components include:

  • Members: A pre-selected group of entities (e.g., exchanges, foundations).
  • Signatures: Each member signs a hash of the data batch.
  • Slashing: Mechanisms to penalize malicious members, if implemented.
02

DAC Architecture & Key Components

A functional DAC system requires several integrated components. The Sequencer batches transactions and sends data to committee members. Committee Nodes run client software to receive, store, and sign data availability attestations. A Data Availability Service provides the API and infrastructure for data submission and retrieval. On-Chain Contracts verify the aggregate signatures of the committee to confirm data is available before finalizing state updates. This architecture is used by networks like Arbitrum Nova and Polygon Avail in its early testnet phases.

04

Security Models & Trust Assumptions

DACs operate on an honest majority assumption, requiring a threshold (e.g., 2/3) of members to be honest. This is weaker than base-layer blockchain security but stronger than a single operator. Risks include:

  • Collusion: Members could withhold data, freezing the chain.
  • Centralization: The committee is a permissioned set.
  • Liveness Failure: If members go offline, data cannot be attested. Mitigations include bonding/slashing, member rotation, and fraud proofs that allow users to challenge unavailable data. The security model is explicitly defined in the Data Availability Challenge protocol.
06

Deploying a Testnet DAC

To deploy a test DAC, start with a local development network. Use a framework like Hardhat or Foundry to deploy the smart contracts for signature aggregation. Set up 4-7 nodes running a simple data availability client that listens for data blobs, stores them in IPFS or a local database, and returns a signature. Implement a basic threshold signature scheme (e.g., BLS) for attestations. Test the liveness and fault tolerance by simulating member failures. Tools like the Arbitrum Nitro devnet provide a reference implementation for integrating with a DAC.

member-selection-setup
ESTABLISHING A DAC

Step 1: Committee Member Selection and Onboarding

The foundation of a secure Data Availability Committee (DAC) is its members. This step details the criteria and process for selecting and onboarding trusted entities to form the committee.

A Data Availability Committee (DAC) is a group of trusted, independent entities that collectively sign attestations confirming that transaction data for a Layer 2 (L2) rollup is available. This acts as a security fallback, allowing the L2 to operate with lower trust assumptions than a pure validity proof system would require. The committee's primary role is to provide a signed cryptographic commitment, often a DataAvailabilityCertificate, that the necessary data has been posted and can be retrieved. This certificate is then used by fraud proof or validity proof systems to verify state transitions. The integrity of the entire system hinges on the committee's honesty and reliability.

Selecting committee members requires a rigorous, multi-faceted evaluation. Key criteria include technical competence (experience in node operation, cryptography, and blockchain infrastructure), reputation and track record (established entities with public histories), geographic and jurisdictional diversity to mitigate systemic risks, and economic alignment (significant stake or skin in the game). Potential members are often vetted from pools of professional node operators, established staking services, academic institutions, and other Layer 1 (L1) validator communities. The goal is to assemble a group that is both highly capable and difficult to corrupt or coerce collusively.

The onboarding process formalizes the member's commitment. This involves executing a legal or cryptoeconomic agreement, such as a bonding smart contract on the L1, which can slash a member's stake for malicious behavior. Technically, each member must set up a secure, highly available server running the DAC node software. This software is responsible for monitoring the data availability layer (like an L1 calldata or a dedicated DAC network), generating signatures for valid data, and participating in the committee's consensus mechanism, which may be a simple threshold signature scheme (e.g., 5-of-7) or a more complex BFT consensus protocol.

Once operational, the committee's public keys are registered on-chain in a DAC manager contract. This contract acts as the source of truth for which entities are authorized signers. For example, an Optimism-style fault proof system might check the contract to validate a DataAvailabilityCertificate signed by a quorum of the registered keys. The initial committee configuration—including the member set, the signing threshold (e.g., 5 out of 7), and the multisig wallet address for governance—is immutable or upgradeable only via a strict, transparent governance process defined at inception.

commitment-scheme-implementation
DAC ARCHITECTURE

Step 2: Implementing the Commitment Scheme

A Data Availability Committee (DAC) requires a cryptographic commitment to the data it holds. This step details how to implement the core scheme that allows users to verify data availability without downloading it.

The foundation of a DAC is a cryptographic commitment scheme. The committee must produce a single, verifiable proof that a specific piece of data (like a transaction batch) is available upon request. The most common method is to use a Merkle tree. The DAC members collectively agree on the root hash of a Merkle tree constructed from the data chunks. This root hash, signed by a threshold of committee members, becomes the data availability attestation that is posted on-chain.

Implementing this requires a smart contract on the destination chain (e.g., an L2) that can verify these attestations. The contract stores the public keys of the DAC members and defines the signature threshold (e.g., 5-of-9). When a new batch of data is committed, the contract checks that the submitted Merkle root is signed by enough valid member signatures. Popular libraries like OpenZeppelin's ECDSA can be used for signature aggregation and verification in Solidity.

Here is a simplified Solidity function stub for verifying a DAC attestation:

solidity
function verifyDACAttestation(
    bytes32 merkleRoot,
    bytes[] calldata signatures
) public view returns (bool) {
    // Recover signers from signatures
    // Check if signers are valid committee members
    // Verify threshold is met (e.g., >= 5 unique signers)
    // If valid, store the root as attested
}

The actual data blobs are stored off-chain by the DAC members, typically in a decentralized storage network like IPFS, Celestia, or EigenDA. The Merkle root serves as a secure pointer to this data.

For users and light clients, data availability sampling is enabled by this scheme. By knowing the attested Merkle root, a user can request a random chunk of the data along with its Merkle proof. They can verify the proof against the on-chain root, providing high probabilistic certainty that the entire dataset is available. This is far more efficient than downloading all the data.

Key operational considerations include member rotation and key management. The on-chain contract must allow for updating the member set, often governed by a multisig or DAO. Using a BLS signature aggregation scheme, where possible, can significantly reduce on-chain gas costs by combining multiple signatures into one, a method employed by networks like EigenLayer and Polygon Avail.

Ultimately, this commitment scheme creates a trust-minimized bridge for data availability. It shifts the security assumption from trusting a single sequencer to trusting that a defined, accountable committee is honestly storing and serving the data, which is a measurable improvement for many scaling solutions.

data-storage-retrieval
OFF-CHAIN DATA STORAGE

How to Establish a Data Availability Committee (DAC)

A Data Availability Committee (DAC) is a trusted group of entities responsible for storing and attesting to the availability of transaction data for a Layer 2 (L2) rollup, enabling cheaper and faster transactions while maintaining security.

A Data Availability Committee (DAC) is a core component of certain validium and volition scaling solutions. Unlike rollups that post all transaction data to the base layer (e.g., Ethereum), these systems keep data off-chain. The DAC's primary role is to cryptographically attest—typically by signing—that the data for a state transition is available and can be provided upon request. This attestation is posted on-chain, allowing the L2 to progress without the cost of full on-chain data publication. The security model shifts from the base layer's consensus to the trustworthiness and decentralization of the committee members.

Establishing a DAC involves several key technical and governance steps. First, you must define the committee's membership criteria and size. Members are often reputable entities like exchanges, wallet providers, infrastructure companies, or staking services. A larger, more decentralized committee increases security but adds coordination complexity. Next, you need to implement the attestation protocol. This usually involves each member running a node that receives batch data from the sequencer, verifies its integrity, and produces a BLS or ECDSA signature over the data's hash. These signatures are aggregated into a single proof posted to the L1 contract.

The committee's operational infrastructure is critical. Each member must run a high-availability storage node with redundant systems to guarantee data persistence. They must also operate a signer service that can securely generate attestations without exposing private keys. Communication between the sequencer and DAC members is typically handled via a peer-to-peer network or a dedicated API. For developers, integrating with a DAC often means interacting with smart contracts like DACRegistry.sol to verify attestations and DataAvailability.sol to manage data requests and challenges.

From a smart contract perspective, the L1 verifier contract must be able to validate the committee's attestations. A common pattern uses a multisig or threshold signature scheme (like BLS). The contract stores the committee's public keys and verifies that a quorum (e.g., 5 of 7) has signed the correct data root. Here's a simplified conceptual interface:

solidity
interface IDAC {
    function verifyAttestation(bytes32 dataHash, bytes calldata signatures) external view returns (bool);
    function requestData(uint256 batchNumber) external returns (bytes memory);
}

The requestData function allows users to trigger a data retrieval from the committee, with penalties for non-compliance.

The security and economic model of the DAC is paramount. Members often post a bond or stake that can be slashed if they fail to provide data upon a valid request or sign invalid data. This creates a strong incentive for honest behavior. Data challenge protocols allow users to request specific data; if the committee fails to respond within a timeout period, the L2 can enter a fraud proof mode or halt. It's crucial to design for member rotation and key updates without compromising liveness. Projects like StarkEx and Polygon Avail have operational DACs that provide real-world reference implementations.

When implementing a DAC, consider the trade-offs. It significantly reduces transaction fees compared to full on-chain data availability but introduces a trust assumption in the committee's honesty and liveness. The system's security is effectively the sum of its members' reputations and the strength of its slashing conditions. For maximum security, aim for a geographically distributed committee of well-known, independent entities and consider progressive decentralization over time, potentially evolving towards a proof-of-stake model for data availability.

ARCHITECTURE COMPARISON

DAC Implementation Models and Trade-offs

A comparison of common technical models for structuring a Data Availability Committee, detailing their core mechanisms and associated trade-offs.

Key DimensionCentralized Sequencer ModelMulti-Signer Committee ModelThreshold Signature (TSS) Model

Data Signing Authority

Single entity (Sequencer)

All committee members

Threshold of committee members

Fault Tolerance

Liveness Requirement

1 of N

N of N

K of N (e.g., 5 of 8)

Key Management Complexity

Low

High (N independent keys)

High (distributed key generation)

Typical Finality Time

< 1 sec

2-10 sec

2-5 sec

Committee Member Downtime Impact

Total failure

Total failure

Degraded liveness

Implementation Example

Early Optimism

Arbitrum AnyTrust (BOLD)

Celestia DAC (planned)

Trust Assumption Reduction

Low

Medium

High

slashing-dispute-resolution
DAC OPERATIONS

Step 4: Defining Slashing Conditions and Dispute Resolution

This step defines the economic and procedural rules for penalizing malicious committee members and resolving disputes over data availability.

A Data Availability Committee's (DAC) security model relies on cryptoeconomic incentives to ensure members act honestly. The core mechanism is slashing, a penalty where a member's staked collateral is partially or fully confiscated for provable misbehavior. Common slashing conditions include: - Signing an invalid data root for a block where data is unavailable. - Double-signing, or attesting to two conflicting data roots for the same block height. - Censorship, such as refusing to provide data signatures for valid transactions within a predefined timeframe. These conditions must be codified in the DAC's smart contract.

The dispute resolution process allows users or watchdogs to challenge a committee member's actions. A typical flow involves: 1. A challenger submits a fraud proof to the governing smart contract, providing cryptographic evidence (e.g., a Merkle proof of missing data). 2. The contract verifies the proof against the signed commitment. 3. If valid, the slashing condition is triggered automatically, penalizing the faulty member and often rewarding the challenger. This automated, trust-minimized process is critical for maintaining the system's liveness and data integrity without relying on a central arbiter.

Implementing these rules requires careful smart contract design. For example, an AvailCommitment contract might include a slashMember(address member, bytes fraudProof) function. The fraudProof would be decoded to check if it demonstrates a violation of a pre-defined condition stored in a SlashingConditions struct. Time-locks and challenge periods are also essential; members may have a 7-day window to respond to a challenge before funds are slashed, preventing false accusations from causing immediate harm.

Beyond automated slashing, a DAC should have a graded penalty system. A minor lapse, like being temporarily offline, might incur a small penalty, while malicious signing could result in a 100% slash of the stake. Furthermore, a governance-managed treasury funded by slashed funds can be used for operational costs or compensating users affected by downtime. This creates a sustainable economic model that aligns member incentives with network health.

Finally, dispute resolution must be transparent and verifiable. All slashing transactions, fraud proofs, and member challenges should be recorded on-chain. Projects like EigenLayer and AltLayer provide frameworks and audits for building such secure, modular slashing conditions. By clearly defining and automating these rules, a DAC transitions from a social promise to a cryptoeconomically secure component of a rollup's architecture.

operational-monitoring
DATA AVAILABILITY COMMITTEE

Step 5: Operational Monitoring and Key Management

A Data Availability Committee (DAC) provides an off-chain data availability guarantee for Layer 2 solutions like Optimism and Arbitrum, ensuring data can be reconstructed if the primary sequencer fails.

A Data Availability Committee (DAC) is a group of trusted, independent entities that cryptographically commits to storing and serving the transaction data for a Layer 2 (L2) rollup. This model is a pragmatic alternative to posting all data directly to the Layer 1 (L1) blockchain, significantly reducing gas costs. Members sign attestations, often using a BLS signature scheme for efficient aggregation, confirming they have received and will retain the data for a predefined challenge period. This creates a robust safety net, ensuring that even if the primary sequencer disappears, the data required to rebuild the L2 state remains accessible.

Establishing a DAC requires careful member selection and technical setup. You must choose reputable entities with high uptime guarantees, often including other projects, foundations, or professional staking services. The operational core is a DAC Node, which runs software to automatically receive data batches from the sequencer, store them, and participate in the signing protocol. For example, an Optimism-based chain using a DAC would configure its BatchInbox address to point to the DAC's service, which then relays confirmed data to committee members. Each member must securely manage their private signing key, which is used exclusively for attestations.

The key management and signing process is critical for security. A common implementation involves running a signing service that listens for new data batches. When a batch is received and validated, the service uses its secured private key to generate a signature. These individual signatures from committee members are aggregated into a single BLS signature, which is then posted back to the L1 smart contract or to the sequencer. This aggregated signature acts as proof that the threshold of DAC members has attested to the data's availability. Private keys should be stored in hardware security modules (HSMs) or using multi-party computation (MPC) systems to prevent single points of failure.

Continuous monitoring is non-negotiable for DAC operations. You need to monitor: Node Health (disk space, memory, sync status), Signing Activity (successful attestations for each batch), and L1 Contract State (verifying posted signatures). Alerts should be configured for missed batches or signing failures. Tools like Grafana dashboards coupled with Prometheus metrics exported by the DAC node software are standard. Furthermore, members should regularly test the data retrieval process to ensure stored data is correct and can be served to a verifier or a full node attempting to synchronize the L2 chain from DAC sources.

The economic and governance model of the DAC must be defined upfront. This includes compensation for members, slashing conditions for misbehavior (e.g., failing to sign or storing incorrect data), and a process for rotating members in and out of the committee. These rules are typically encoded in a multisig-governed smart contract on L1. It's also essential to plan for data retention policies, deciding how long historical data must be archived after the challenge period expires. A well-operated DAC transparently publishes its member set, operational status, and historical attestation records to maintain trust with the L2's users and developers.

decentralization-path
A STEP-BY-STEP GUIDE

How to Establish a Data Availability Committee (DAC)

A Data Availability Committee (DAC) is a transitional trust model for Layer 2 rollups, where a set of known, reputable entities cryptographically attest to the availability of transaction data. This guide details the technical and operational steps to form one.

A Data Availability Committee (DAC) serves as a critical interim solution for optimistic rollups and zk-rollups before achieving full data availability on a base layer like Ethereum. Its primary function is to provide a signed attestation that the transaction data for a new state root is available for download, preventing fraud. Members are typically known entities like foundations, core developers, or established projects. The core technical component is a multi-signature scheme where committee members sign a message, often the L2 block hash or a Merkle root of the transaction data, confirming they have stored the full data and can serve it upon request.

Establishing a DAC begins with member selection and technical setup. You must define the committee's governance: the number of members (e.g., 5-of-8 multisig), selection criteria, onboarding/offboarding procedures, and slashing conditions for malfeasance. Each member must run a data availability node, which is software that stores the full L2 transaction data and participates in the signing protocol. Projects like Arbitrum's AnyTrust and Polygon Avail provide frameworks for DAC implementation. The node software typically exposes an API for the sequencer or prover to submit data and collect signatures, and for users to retrieve data with cryptographic proofs.

The operational workflow involves continuous coordination. For each new L2 block, the sequencer disseminates the batch data to all DAC member nodes. Each node validates the data's format and correctness, then signs a commitment. Once a supermajority threshold of signatures (e.g., 4 out of 5) is collected, the aggregated signature is posted on-chain, often in a smart contract. This on-chain attestation allows verifiers and users to trust that the data is available without downloading it themselves. Monitoring and alerting systems are essential to ensure high uptime and rapid response if a member node fails, preserving the system's liveness guarantees.

From a security perspective, a DAC introduces a distinct trust assumption. Users must trust that the committee members are honest and will not collude to withhold data. To mitigate this, committees often implement data dispersal techniques, splitting data erasure-coded across members so that only a subset is needed for reconstruction. Transparency is key: member identities and signing keys should be public, and all attestations should be verifiable on-chain. The end goal is always a transition; a well-architected DAC system should have a clear, executable path to full decentralization, such as migrating to a validium with data availability on a dedicated chain or eventually to a base-layer blob-based model.

DATA AVAILABILITY COMMITTEES

Frequently Asked Questions (FAQ)

Common technical questions and troubleshooting for developers implementing or interacting with Data Availability Committees (DACs).

A Data Availability Committee (DAC) is a set of trusted, permissioned nodes that cryptographically attest to the availability of transaction data for a Layer 2 (L2) rollup. It serves as a lighter-weight, more scalable alternative to posting all data directly to the base layer (L1).

How it works:

  1. The rollup sequencer generates a batch of transactions and computes a new state root.
  2. The transaction data is sent to all DAC members off-chain.
  3. Each member signs a Data Availability Attestation (DAA), a cryptographic commitment (like a Merkle root) proving they have received and stored the data.
  4. The sequencer posts only the state root and the aggregated signatures to the L1 contract.
  5. Users and verifiers can trust data is available because a quorum of known, staked members have attested to it. If data is withheld, their stake can be slashed.
How to Establish a Data Availability Committee (DAC) | ChainScore Guides