At ETHCC, Vitalik Buterin mentions a number of tests that can be used to prove if a business in cryptographic space is really secure and durable to resist various attacks.
During speech During the Ethereum or ETHCC community conference, the co-founder of Ethereum (ETH) Vitalik Buterin highlights several ways that users and manufacturers can judge whether a crypto company is really as safe and decentralized as they claim.
The first test he mentioned was the “walking test”, which involved the question of whether user assets are still safe if the company and all its servers were to dissolve suddenly. The main advantage of being on a chain means that user assets are intrinsically safe because they are not all maintained in a single server.
“It’s like the most basic thing you should try to get out of your chain assets instead of your assets on a server,” Buterin told ETHCC.
He described the “privileged integrated portfolios” as an example of good security, as they grant users the possibility of exporting their key to another portfolio instead of keeping it in one.
Another example he mentioned was Farcaster, a decentralized social media protocol built on blockchain technology which gives users the possibility of choosing a backup address such as an Ethereum account is the basis of the social media account.
“The reason for which this is surprising is that it is to achieve the objective of decentralization, not only as something they say that they have because they are in a chain,” said Buterine.
The next test is something he calls the “initiate attack test”, which poses the scenario according to which if a company is hacked by an initiate employee or the founder himself, how much damage can they get away with it?
During his ETHCC speech, Buterin said that manufacturers should assess the weaknesses of the system not only from an external point of view, but an initiate. These weaknesses can range from intelligent contracts, from the user interface, from the Oracle to the main holders of governance tokens.
“Many projects in the ecosystem, I think, have done an excellent work of seriously reflection on these problems. But this is something that we really have to emphasize much more as first -class property,” Buterine told STHCC.
Another test to consider is the computer test of confidence. Buterin asks the public of the ETHCC to consider the number of “Code of Code Confidence in you does not typing yourself”. Mainly, the less lines of trust, the more secure the system. He thinks that it is for a system that has millions of lines of code. The same is true if the majority of codes are in sand or restricted to carry out critical actions.
However, if the TCB is swollen beyond what anyone can audit realistically, even though systems that claim to be without confidence are only based on trust in practice.
Finally, Buterin asked manufacturers “to analyze the properties of the game” that a system creates. He warned that even if a protocol is designed to be decentralized and neutral, it can always be centralized if it encourages convenience through centralized solutions, just like the way web1 has evolved in web2.
Consequently, he said that without good decentralized backup solutions, users tend to drift to centralized suppliers for more convenience, completely canceling the advantages of decentralization.