Vitalik Buterin at EthCC: Here’s How to Tell if a Crypto Project is Hack-proof and Decentralized!

Updated
July 3, 2025
Gambar Vitalik Buterin at EthCC: Here’s How to Tell if a Crypto Project is Hack-proof and Decentralized!

Jakarta, Pintu News – At the Ethereum Community Conference (EthCC) conference, Vitalik Buterin, co-founder of Ethereum , shared some important methods for assessing the security and decentralization of companies in the crypto space.

Buterin emphasized the importance of ensuring that users’ assets remain secure and that the systems used are not easily compromised, either by internal or external parties.

Check out the full information here!

Asset Security Test: Walkaway Test

Vitalik Buterin introduced the “walkaway test” as a way to evaluate whether users’ assets would remain safe if the company and all its servers suddenly disappeared. The main advantage of a blockchain-based system is that users’ assets are not stored on a single server, but are instead spread across a decentralized network.

This significantly increases the security of users’ assets. For example, Buterin points to “privvy embedded wallets” that allow users to export their keys to other wallets, thus not being tied to a single provider.

Also read: North Korean Hackers Allegedly Hold 900+ Positions in the Crypto Industry, Here Are the Details!

Insider Attack Test: Insider Attack Test

Buterin also proposed an “insider attack test”, which aims to assess how much damage could be done if there was an attack from within, such as by the company’s own employees or founders.

This test is important to understand how resilient the security system is in protecting assets from internal threats. By understanding the potential damage that could occur, companies can take better preventive measures and improve their security systems.

Read also: JPMorgan’s Breakthrough: Tokenizing Carbon Credits for Market Transparency!

Trusted Computing Base Test: Trusted Computing Base Test

Furthermore, Buterin suggested considering the “trusted computing base test”, which asks how many lines of code a user can trust not to cheat.

The fewer lines of code that must be trusted, the more secure the system is. Buterin emphasizes the importance of transparency and lack of trust as the keys to a secure system. Reducing the amount of code that must be trusted also reduces the risk of possible failure or manipulation.

Conclusion

Buterin cautioned that even though protocols are designed for decentralization and neutrality, they can still end up being centralized if they push convenience through a centralized solution.

Without a good decentralized backup solution, users tend to turn to centralized providers for convenience, which ultimately eliminates the benefits of decentralization. Therefore, it is imperative that developers and users continue to encourage and support truly decentralized solutions.

That’s the latest information about crypto. Follow us on Google News to stay up-to-date on the world of crypto and blockchain technology.

Enjoy an easy and secure crypto trading experience by downloading Pintu crypto app via Google Play Store or App Store now. Also, experience web trading with advanced trading tools such as pro charting, various types of order types, and portfolio tracker only at Pintu Pro. Pintu Pro Futures is also available, where you can buy bitcoin leverage, trade btc futures, eth futures and sol futures easily from your desktop!

*Disclaimer

This content aims to enrich readers’ information. Pintu collects this information from various relevant sources and is not influenced by outside parties. Note that an asset’s past performance does not determine its projected future performance. Crypto trading activities have high risk and volatility, always do your own research and use cold cash before investing. All activities of buying and selling bitcoin and other crypto asset investments are the responsibility of the reader.

Reference

Share

Latest News

See All News ->