The Business & Technology Network
Helping Business Interpret and Use Technology
S M T W T F S
 
 
 
 
1
 
2
 
3
 
4
 
5
 
6
 
7
 
8
 
9
 
 
 
 
 
 
 
 
 
 
 
 
 
 
23
 
24
 
25
 
26
 
27
 
28
 
29
 
30
 
31
 

Buterin and Yakovenko Clash Over Ethereum Layer-2 Security

DATE POSTED:October 26, 2025

Ethereum co-founder Vitalik Buterin and Solana co-founder Anatoly Yakovenko have presented conflicting views on the security of Ethereum’s layer-2 networks.

This has sparked debate within the crypto industry over whether L2 solutions truly inherit robust security from Ethereum’s base layer.

Buterin Defends L2 Security Model

Buterin emphasizes that Ethereum layer-2 solutions maintain strong security against 51% attacks. They inherit finality guarantees from the base layer. In a recent post on X, he stated: “A key property of a blockchain is that even a 51% attack cannot make an invalid block valid. This means even 51% of validators colluding (or hit by a software bug) cannot steal your assets.”

However, Buterin acknowledged limitations when validator sets are trusted beyond chain-controlled functions.

“This property does not carry over if you start trusting your validator set to do other things, that the chain does not have control over,” he added. “At that point, 51% of validators can collude and give a wrong answer, and you don’t have any recourse.”

Regular reminder:

A key property of a blockchain is that even a 51% attack *cannot make an invalid block valid*. This means even 51% of validators colluding (or hit by a software bug) cannot steal your assets.

However, this property does not carry over if you start trusting…

— vitalik.eth (@VitalikButerin) October 26, 2025

Major L2 networks, including Arbitrum, Base, Optimism, and Worldchain, collectively hold over $35 billion in locked value. They rely on Ethereum’s security architecture. The Ethereum validator set currently exceeds one million active participants, significantly outnumbering Solana’s approximately 2,000 validators. Proponents argue this bolsters resistance to coordinated attacks.

Yakovenko Questions L2 Security Assumptions

Yakovenko directly challenged Buterin’s assertions.

“The claim that L2s inherit eth security is erroneous. 5 years into the L2 roadmap, wormhole eth on solana has the same worst case risks as eth on base and generates as much revenue for eth L1 stakers,” he stated on X(Twitter).

The claim that L2s inherit eth security is erroneous. 5 years into the L2 roadmap, wormhole eth on solana has the same worst case risks as eth on base and generates as much revenue for eth L1 stakers. It’s wrong no matter how you slice it.

— toly