
Author: haotian, independent researcher Source: X, TMEL0211
See @Goplussecurity early in the morning to build a modular unified user security layer.As the former Crypto security veteran, it ignited an unfavorable security vision.The most important “security” direction of Crypto has always been driven by “service”, and it is always in the embarrassing status quo of “scribbled scribbled in advance, but helplessly shooting the thighs afterwards.” How can I break the situation?Will the modular security unified network be the optimal solution?Next, talk about my opinion:
1) Safety issues will always be valued after the incident, that is, the problem of “safety awareness” we often say, not the overall cognition that can be improved by the short -term calling and shouting.After being tied, it can gradually become a sense of alertness.
And the “security incident” can only be mature and decreased by the accompanying industry, and it will not disappear.Therefore, safety as a “service” will always be needed, but it is always passive, which is not conducive to the security company to improve its Crypto ecosystem;
2) Modularization has become a normal development path in the Crypto field. Whether it is a middleware network, or Layer2, or some of the independent DA modules, Execution modules, settlement modules, and the Security security in the expectationLayer modules are step by step to become the key module that constitutes the main elements of Crypto.
In the future, the consensus layer, settlement layer, execution layer, DA layer, etc. of the original chain will be modularly packaged in a modular manner, and embedded in the architectural system of each blockchain in high interactivity.The same is true for the security module layer.
3) As the overall development of the industry has matured, the hacking incident of pure B -end is becoming less, which is directly related to the progress of the industry code of the industry’s Developer’s continued safety protection work and the Defi black case forest -driven industry code.It does not mean that the overall safety scourge will die, and a large number of fishing attacks will become a new round of safety and severely disaster -stricken areas.Therefore, a security module layer that faces the C -side and can give users “unconscious” security protection must bear the mission;
4) How to emphasize “unconsciousness”, because the advancement of technology and the maturity of the industry must abstract complex problems to the back -end Infra layer to solve it, and the GAP that front -end users feel will become smaller and smaller.Based on the modular structure chain security component, it involves the timely blocking of dangerous and suspicious transactions, the path preview before the trading chain, the update of Oracle information under the front -end ALERT warning before the signature, the update of the chain such as the fishing website, the KYC anti -money laundering compliance supervision, etc.wait.
Theoretically simple, but it is actually compatible with each chain, different consensus, and also requires the rude Wallet, DEX and other protocols in different environments. It is not easy to fully use the value of the modular security layer;
5) If it is safe to stay on the “service” layer, an inevitable reality is that there are endless plug -ins, and various tools, and even face -to -face developers, ordinary users, traders, institutional users, etc. must be equipped with different security solutions.As a result, the heating of competition between security companies, ordinary users did not have a sense of improvement at the safety level.
The security industry also needs a unified security module layer. It continues to achieve safety warning and experience improvement on C -side users. Infra is highly compatible with B -end developers and chains, wallets, protocols, etc.Only with security protection work can be improved.
In short, security offensive and defense will be a problem that will always exist in the Cryptp field, because too close to money, there will always be hackers to hide in the dark and scan the security weak ring to attack.
In essence, hackers attack and security protection are cost confrontation. To do protection goals, the cost of hackers should be increased.The fragmented security service is like fighting guerrillas, and the consistent security chain ecological construction and the modular security layer of united front protection. In my opinion, it is currently the best solution to enhance the security level of Crypto.