Nothing about an L2 inherits the security of the L1 If you can't build performant protocols without censorship resistance... Pivot to TradFi