Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
The Power of Redundancy in Protecting Blockchain Security—Vitalik Buterin Presents a New Perspective
Vitalik Buterin, co-founder of Ethereum, engaged in an interesting discussion about the fundamental relationship between security and user experience (UX) in blockchain systems. At the core of his argument is the concept of “redundancy,” which is an essential design principle for ensuring system robustness. Buterin emphasizes that security and UX are not conflicting but rather mutually complementary.
Discrepancies Between User Intent and System Operation—Security and UX Are Two Sides of the Same Coin
Buterin defines the essence of security as minimizing the gap (discrepancy) between the user’s intended action and the actual operation performed by the blockchain system. While this may seem like a technical security issue at first glance, it is also a UX challenge. For example, a user may simply want to “send 1 ETH to Bob,” but due to the complexity of verifying Bob’s identity, it is impossible to define this perfectly mathematically.
Adding to the complexity are multi-layered objectives like privacy protection. In such cases, metadata leaks can pose a greater risk than the encryption technology itself. In other words, “perfect security” is fundamentally unattainable, and system designers must adopt a practical approach. Buterin points out that security should focus on mitigating tail risks—low-probability, high-impact events.
Complementing Imperfection with Multi-Layer Defense—Ensuring Robustness Through Redundancy
Since perfect security is impossible, Buterin advocates for a multi-faceted approach utilizing “redundancy.” Effective security solutions enable users to express their intentions through multiple different methods, and systems should only act when actions are verified from various perspectives.
Examples of implementing this redundancy include:
All these methods are based on the shared principle of reducing risk through “redundancy.” If one mechanism fails, others can cover the gap.
The Role of LLMs in Intent Verification—A Multi-Perspective Approach
Interestingly, Buterin notes that large language models (LLMs) could add a new dimension to this redundancy strategy. General LLMs approximate human common sense, and fine-tuned LLMs can mimic user-specific behavior patterns.
However, he issues an important warning: the final judgment of user intent should not rely solely on LLMs. Instead, LLMs should serve as supplementary perspectives to strengthen redundancy. Combining LLM assessments with other verification mechanisms can lead to a more robust security system.
Redundancy as a Design Principle for Next-Generation Blockchains
Vitalik Buterin’s discussion suggests that enhancing blockchain security should not focus on a single solution but rather on ensuring redundancy through multiple approaches. The balance between security and UX ultimately hinges on this philosophy of redundancy. To create systems that are both user-friendly and secure, architecture must incorporate redundancy from the design stage.