Vitalik Buterin discusses improving the Ethereum core protocol.

Ethereum’S Vitalik Buterin Weighs Pros And Cons Of Core Expansion


Ethereum founder Vitalik Buterin discussed maintaining the simplicity of the protocol while introducing advanced feature integration. He said that the reluctance to put as little as possible on the protocols is “known and good”.

In a September 30th blog post, Buterin explained that Ethereum software was built to be low-level and easily adaptable to the different needs of its users, avoiding the curse of software bloat.

It highlights the risks and benefits of integrating additional features

By Buterin, discussions regarding Layer1 and Layer2 blockchain networks focus on the importance of integrating additional features into the protocol.

itrust

This addresses various user needs and other concerns such as privacy, usernames and account security.

Ethereum's founder suggests that integrating additional features into the core protocol “could reduce decentralization and improve security across various blockchain ecosystems.”

This strategy can also lead to standardized solutions to enhance the user experience.

However, Buterin warns that this approach comes with risks. “Excessive expansion can overextend trust and administrative burdens,” he said. He also pointed out that “over-complicating the protocol” and failing to predict users' needs could backfire in the long run.

Suggest features that could be added.

For this reason, Buterin suggested solution-specific features that could be integrated into the core of the protocol. These features include changing the penalty rules to make untrustworthy liquidation more viable.

Another feature includes EVM-MAX or SIMD encryption to efficiently implement a wide range of workloads. The protocol can introduce EVM authentication instead of imposing a general concept of encapsulation.

Buterin said:

“What features should be included in the protocol and what features should be left to other layers of the ecosystem is a complex trade-off, and we should expect the results to improve over time as we understand the needs of users and our suite. Ideas and technologies continue to evolve.”

Lido and Rocket Pool's approach to liquidation poses a threat

Meanwhile, Buterin made a mistake in the selection process for Lido and Rocket Pool's node operators. According to him, the method working with these protocols cannot be unlimited because attackers can mix with users' funds and amplify their attacks.

he said:

“Lido, which has DAO authorized node operators, and Rocket Pool, which allows anyone to run a node if they put 8 ETH (1/4 of the capital) as a deposit. These two approaches have different risks: the Rocket Pool approach allows attackers to attack 51% of the network and forces users to pay most of the cost. In a DAO approach, one such share token is controlled, leading to a single, attackable governance widget that controls all Ethereum validators.

Ethereum Liquid Staking Protocols. Source: DeFillama

Lido and Rocket Pool control more than 77% of the Ethereum liquid storage market, according to DiFilam data.

Disclaimer

Adhering to the Trust Project guidelines, BeInCrypto is committed to unbiased, transparent reporting. This news report aims to provide accurate and up-to-date information. However, readers are advised to independently verify facts and consult with professionals before making any decisions based on this content.

Leave a Reply

Pin It on Pinterest