The new post reflects Buterin’s renewed focus on scaling Ethereum’s base layer, after several years in which much of the ecosystem’s scaling strategy centered on layer-2 rollups.
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.
Learn about the significant Ethereum Shanghai upgrade, which empowered ETH users to unlock staked assets, reshaping the blockchain's proof-of-stake system.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results