Scan to download
BTC $65,894.23 -1.91%
ETH $1,941.87 -1.36%
BNB $619.63 +0.36%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $440.25 -4.09%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%
BTC $65,894.23 -1.91%
ETH $1,941.87 -1.36%
BNB $619.63 +0.36%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $440.25 -4.09%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%

blind

Vitalik: The new EVM chain should be innovative and genuinely rely on Ethereum, avoiding blind replication

Ethereum founder Vitalik Buterin stated that currently, a large number of newly created EVM chains are simply replicating existing architectures or connecting to Ethereum through optimistic bridges with a one-week delay. This approach is akin to the governance replication seen in Compound; while it is "comfortable," it depletes innovation in the long run, leading the ecosystem into a dead end.If a new chain does not connect to Ethereum's optimistic bridge (i.e., purely a substitute L1), the situation is even worse. What the ecosystem truly needs are projects that can bring new features, such as privacy protection, application-specific efficiency, or ultra-low latency. The form of "Ethereum connection" must match the actual functionality.For example, prediction market applications can issue and settle markets on L1, manage user accounts, but transaction execution occurs in a Rollup or L2-like system, with L1 verifying signatures and market states. A deeply connected L1 architecture should be prioritized, rather than a formal bridge for recognition.Another type of "application chain" can verify algorithm execution on government, social media, or gaming platforms, ensuring updates are authorized and executed according to pre-committed rules through technologies like STARK. Although these chains are not entirely Ethereum, they can provide algorithmic transparency and minimize trust, facilitating economic activities that were previously impossible.New projects should achieve two points: first, truly bring innovation, not just replicate existing EVM chains; second, ensure that the public relations image matches actual functionality. The project's claimed level of connection to Ethereum should genuinely reflect its technical and ecological dependencies, ensuring ecosystem interoperability and long-term value.

a16z Crypto: The security focus of public chains like BTC and ETH should be on protocols and governance, without blindly switching to quantum-resistant solutions

a16z Crypto published a long article on platform X stating that the timeline for the emergence of quantum computers capable of breaking cryptocurrencies (CRQC) is often exaggerated, and the likelihood of their appearance before 2030 is extremely low. The risk status of different cryptographic primitives varies.Post-quantum encryption needs to be deployed immediately due to the "harvest now, decrypt later" (HNDL) attack. In contrast, post-quantum signatures and zkSNARKs are less susceptible to HNDL attacks; migrating too early could bring risks such as performance overhead, immature implementation, and code vulnerabilities. Therefore, a cautious rather than hasty migration strategy should be adopted.For blockchains, most non-privacy public chains like Bitcoin and Ethereum primarily use digital signatures for transaction authorization, so there is no HNDL risk. The pressure to migrate mainly comes from non-technical challenges such as slow governance, social coordination, and technical logistics.Bitcoin faces unique issues, including its slow governance speed and the existence of millions of quantum-vulnerable tokens worth hundreds of billions of dollars that may be abandoned. In contrast, privacy chains, due to their encryption or concealment of transaction details, do face HNDL attack risks and should transition as soon as possible.a16z Crypto emphasizes that in the coming years, implementation security issues such as code vulnerabilities, side-channel attacks, and fault injection attacks are more urgent and significant security risks compared to the distant threat of quantum computers. Developers should prioritize investment in code audits, fuzz testing, and formal verification.
app_icon
ChainCatcher Building the Web3 world with innovations.