Connect with us
DAPA Banner

Crypto World

Vitalik says Ethereum’s real value is a global shared data bulletin board

Published

on

ETH liquidation walls at $2,057–$1,863 set stage for violent move

Vitalik Buterin reframes Ethereum as censorship‑resistant “global shared memory,” with PeerDAS scaling its data layer for voting, identity, and on‑chain coordination.

Ethereum (ETH) co-founder Vitalik Buterin says the network’s real value lies in acting as a globally shared “bulletin board” for data availability, rather than just a smart contract or payments platform, sharpening the narrative around Ethereum’s role in the broader crypto stack.

Vitalik reframes Ethereum’s core value

In a new post on X, Buterin argued that Ethereum’s fundamental contribution is providing a publicly readable and writable data layer that cryptographic protocols can reliably anchor to. He highlighted that many high-value use cases—secure online voting, software version control, certificate revocation and more—depend on having an open, persistent data space rather than purely on complex smart contract logic.

Buterin framed ETH not only as a payment asset, but as a core instrument for Sybil resistance and as collateral for smart contracts, positioning it at the center of a decentralized, privacy-preserving, open-source technology stack. In his view, smart contracts and DeFi are extensions built atop this shared memory, not the base value proposition itself.

Advertisement

PeerDAS, scaling, and “global shared memory”

Buterin also pointed to Ethereum’s PeerDAS upgrade as a key step in scaling this data availability layer, saying it already increases Ethereum’s data capacity by about 2.3x, with a path toward 10–100x gains over time. Improved data throughput, combined with lower fees, is meant to support a broader range of applications beyond DeFi, including governance systems, identity, and new classes of on-chain coordination tools.

He summed up Ethereum as a kind of “global shared memory,” where applications can reliably publish and read data in a neutral environment secured by ETH-based economic incentives. For developers and protocols, the message is clear: treat Ethereum first as a durable, censorship-resistant data availability layer, and only secondarily as a smart contract execution chain.

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Crypto Hackers Steal $168 Million from DeFi Protocols in Q1 2026

Published

on

Crypto Hackers Steal $168 Million from DeFi Protocols in Q1 2026

Crypto hackers stole over $168.6 million in cryptocurrency from 34 decentralized finance (DeFi) protocols in the first quarter of 2026, falling significantly from the same period last year, according to data from DefiLlama. 

The $40 million private key compromise of Step Finance in January was the largest exploit of the quarter, the data shows, followed by a smart contract manipulation that drained $26.4 million in ether (ETH) from Truebit on Jan. 8. The third-largest was a private key compromise targeting stablecoin issuer Resolv Labs on March 21.

The quarterly figure is low given that the industry saw $1.58 billion stolen in the first quarter of 2025, with the bulk coming from the $1.4 billion Bybit exploit. However, experts warn that crypto hacks aren’t tied to specific periods within a year.

The first three months of 2026 saw less stolen compared to the prior year period.  Source: DefiLlama

Hackers are more active when industry is booming

Nick Percoco, the chief security officer at crypto exchange Kraken, told Cointelegraph that cybercriminal activity in crypto tends to rise around market and event-driven cycles rather than fixed periods.

Threat actors are also drawn to areas where liquidity is concentrated, meaning attack spikes often follow wherever value is accumulating fastest, according to Percoco.

Advertisement

“Bull markets, major product launches and fast-moving growth phases all create more attractive conditions for attackers because more value is at stake and new infrastructure can introduce risk,” he said.  

“That said, attacks are not confined to just these periods. Vulnerabilities can be exploited in any market environment, particularly in complex or rapidly evolving systems, underlining that security in crypto must be continuous.”

Crypto attackers are a “broad and evolving mix”

North Korea-linked actors have been a persistent threat to crypto investors and Web3-native companies alike. 

Hackers affiliated with the organization have been suspected of numerous attacks, including the Wednesday attack on Drift Protocol, a decentralized cryptocurrency exchange that lost an estimated $285 million to a private key leak.

Related: Hacked crypto tokens drop 61% on average and rarely recover, Immunefi report says

Advertisement

Percoco said the threat landscape is a mix of actors with different levels of sophistication, highly coordinated groups targeting core infrastructure, organized cybercriminal networks and opportunistic hackers scanning for weaknesses in smart contracts and client-facing systems.

“It is a broad and evolving mix, but they are ultimately targeting the same thing: global, liquid and accessible value. Targeting is rarely purely random. In many cases, attackers are deliberate in how they assess infrastructure, code, access controls and even human behavior,” he said.

“At the same time, crypto’s transparency makes it easier for opportunistic actors to spot weaknesses as they emerge. The most attractive targets tend to be those combining large concentrations of value, technical complexity and gaps in operational security.”

Security experts previously told Cointelegraph that 2026 would likely see an increase in sophisticated credential theft, social engineering, and AI-powered attacks. 

Magazine: All 21 million Bitcoin is at risk from quantum computers

Advertisement