💥 Gate Square Event: #Post0GWinUSDT# 💥
Post original content on Gate Square related to 0G or the ongoing campaigns (Earn, CandyDrop, or Contract Trading Competition) for a chance to share 200 USDT rewards!
📅 Event Period: Sept 25, 2025, 18:00 – Oct 2, 2025, 16:00 UTC
📌 Related Campaigns:
Earn: Enjoy stable earnings
👉 https://www.gate.com/announcements/article/47290
CandyDrop: Claim 0G rewards
👉 https://www.gate.com/announcements/article/47286
Contract Trading Competition: Trade to win prizes
👉 https://www.gate.com/announcements/article/47221
📌 How to Participate:
1️⃣ Post original cont
Vitalik: Building a fully Open Source stack that is highly secure and easy to verify.
Original Title: The Importance of Full Stack Openness and Verifiability
Author: Vitalik Buterin, founder of Ethereum; Compiled by: Golden Finance
Perhaps the biggest trend of this century so far can be summed up with the phrase "the internet has become part of real life." It began with email and instant messaging. For thousands of years, human private communication was conducted through mouth, ear, pen, and paper, but today it operates through digital infrastructure. Then came digital finance—both crypto finance and the digitization of traditional finance itself. Next, we saw the impact on our health: thanks to smartphones, personal health tracking watches, and data inferred from purchasing behavior, various information about our own bodies is being processed through computers and computer networks. In the next two decades, I expect this trend to cover a variety of other areas, including various government processes (eventually even voting), monitoring of physical and biological indicators and threats in public environments, and ultimately, with the help of brain-computer interfaces, even our own thoughts.
I believe these trends are inevitable; the benefits they bring are simply too great, and in a fiercely competitive global environment, civilizations that reject these technologies will first lose their competitiveness, while those that embrace these technologies will gain an advantage. However, these technologies, in addition to bringing significant benefits, also profoundly affect the power dynamics within and between nations.
The civilizations that benefit the most from the new wave of technology are not those that consume technology, but those that create technology. Centralized plans for equal access can at best provide only a small part of closed platforms and application programming interfaces, and they will fail when exceeding the preset "norm." Moreover, this future requires people to have great trust in technology. If that trust is broken (for example, in the presence of backdoors or security vulnerabilities), it will lead to very serious problems. Even the mere possibility of that trust being broken will force people to revert to fundamentally exclusive social trust models ("Is this made by someone I trust?"). This will create an incentive mechanism that will spread upward along the entire technology stack: those who have decision-making power are the sovereigns.
To avoid these issues, the entire technology stack (including software, hardware, and biotechnology) must possess two interwoven characteristics: genuine openness (i.e., open source, including free licensing) and verifiability (ideally, including direct verification by end users).
###The Importance of Openness and Verifiability in the Health Sector
During the COVID-19 pandemic, we saw the consequences of unequal access to production technology. Vaccines were produced only in a few countries, leading to significant differences in the timing of vaccine availability across different nations. Developed countries received high-quality vaccines in 2021, while other countries only received lower-quality vaccines in 2022 or 2023. Although there were some initiatives aimed at ensuring equal access to vaccines, their effectiveness was very limited due to the fact that vaccine design relies on capital-intensive proprietary production processes, which can only be carried out in a few locations.
COVID-19 vaccination coverage from 2021 to 2023.
The second major issue with vaccines is the lack of transparency in their science and communication strategies, attempting to conceal any risks or drawbacks of the vaccine from the public, which is inconsistent with the facts and ultimately significantly exacerbated public distrust. Today, this distrust has evolved into an almost complete rejection of scientific research findings from the past half-century.
In fact, both of these issues can be resolved. Vaccine development costs, like those of PopVax funded by Balvi, are lower, and the research and production processes are more open and transparent, reducing inequality in access while also making it easier to analyze and verify their safety and efficacy. We can take vaccine design a step further by prioritizing verifiability.
Similar issues exist in the digital field of biotechnology. One of the common statements you will hear when talking to longevity researchers is that the future of anti-aging medicine is personalized and data-driven. To know which medications and nutritional changes should be recommended to patients today, you need to understand their current physical condition. If large amounts of data can be collected and processed digitally in real-time, it would be even more effective.
The same principle applies to defensive biotechnology aimed at preventing adverse effects, such as combating epidemics. The earlier an epidemic is detected, the more likely it is to be stopped at its source – even if it cannot be, every additional week can provide more time for preparation and the development of countermeasures. During the course of an epidemic, being able to know in real-time where people are falling ill is greatly valuable for deploying response measures. If an average person infected with an epidemic learns of their condition and self-isolates within one hour of becoming ill, their transmission rate will be 72 times slower than if they infect others three days after becoming ill. If it is known that 20% of locations cause 80% of the transmission, then improving air quality in those areas can yield further benefits. All of this requires (i) a large number of sensors, as well as (ii) sensors that can communicate in real-time to provide information to other systems.
If we venture further in the direction of "science fiction," we will come into contact with brain-computer interface technology, which can enhance productivity, help people understand each other better through telepathy, and pave a safer path toward highly intelligent AI.
If the infrastructure for biological and health tracking (including personal and spatial) is proprietary, then the data automatically falls into the hands of large corporations. These companies have the ability to build various applications on this basis, while others cannot. They might have access to the data through APIs, but API access will be restricted and used for monopolistic fee extraction, and it can be revoked at any time. This means that only a few individuals and companies can access the most important elements of 21st-century technology, which in turn limits who can profit from it.
On the other hand, if this type of personal health data is not secure, hackers can extort you over any health issues after a breach, manipulating the prices of insurance and healthcare products to profit from you. If this data includes location tracking features, they even know where to wait to kidnap you. Conversely, your location data (which is often hacked) can be used to infer your health status. If your brain-machine interface is hacked, it means hostile forces are reading (or worse, altering) your thoughts. This is no longer science fiction.
In summary, this brings great benefits, but also significant risks: the strong emphasis on openness and verifiability is precisely suitable for mitigating these risks.
###The Importance of Openness and Verifiability in Personal and Commercial Digital Technology
At the beginning of this month, I needed to fill out and sign a form required by a law firm. At that time, I was not in the country. Although there is a national electronic signature system, I did not have it installed at that time. I had to print the form, sign it, and then walk to a nearby DHL courier company, spending a lot of time filling out the paper form, and finally had to pay to send the form by courier to the other side of the globe. Time required: half an hour, cost: $119. On the same day, I needed to sign a (digital) transaction on the Ethereum blockchain to execute an operation. Time required: 5 seconds, cost: $0.10 (fairly speaking, without blockchain, the signature could be completely free).
Such stories are everywhere in the governance of enterprises or non-profit organizations, intellectual property management, and other fields. Over the past decade, you can find them in the financing plans of quite a number of blockchain startups. In addition, there is the most typical use case of "digitally exercising personal power": payment and finance.
Of course, there are significant risks involved: what if the software or hardware is hacked? The cryptocurrency sector recognized this risk early on: the blockchain is permissionless and decentralized, so once you lose access to your funds, there are no resources to turn to for help. No keys, no coins. Therefore, the cryptocurrency sector began to consider multi-signature and social recovery wallets, as well as hardware wallets. However, in reality, the lack of a trustworthy "guardian angel" in many cases is not an ideological choice, but an inherent part of the scenario. In fact, even in traditional finance, "guardian angels" cannot protect the majority: for instance, only 4% of scam victims are able to recover their losses. In use cases involving personal data custodianship, even theoretically, data breaches cannot be restored. Therefore, we need true verifiability and security—both in software and hardware.
A technology for checking whether a computer chip is manufactured correctly.
Importantly, in terms of hardware, the risks we are trying to guard against go far beyond questions like "Are manufacturers evil?" The issue lies in the existence of numerous dependencies, most of which are closed-source, and any negligence in one link can lead to unacceptable security consequences. This paper presents some recent examples illustrating how choices in microarchitecture can undermine the resistance to side-channel attacks of designs that are provably secure in models that consider only software. Attacks like EUCLEAK rely on vulnerabilities that are harder to detect due to the proprietary nature of many components. If training occurs on compromised hardware, AI models may have backdoors implanted during training.
Another issue in all these cases is that even if closed and centralized systems are absolutely secure, there are still some drawbacks. Centralization can create persistent influence among individuals, companies, or countries: if your core infrastructure is built and maintained by a possibly untrustworthy company in a possibly untrustworthy country, you can easily be subject to pressure. This is exactly the problem that cryptocurrencies aim to solve—but the areas where such problems exist extend far beyond just the financial sector.
###The Importance of Openness and Verifiability in Digital Citizenship Technology
I often talk to people from various sectors who are trying to explore better forms of government that are more suitable for the different national conditions in the context of the 21st century. Some are trying to elevate the existing political system to a new level, empowering local open-source communities and using mechanisms such as citizens' assemblies, lotteries, and secondary voting. Others, such as economists studying land value tax or congestion charges, are trying to improve their country's economy.
Different people may have varying degrees of enthusiasm for each idea. However, they all share a common point, which is that they require high-bandwidth participation, and therefore any realistic implementation must be digital. It is acceptable to use pen-and-paper records for basic matters such as who owns what and elections held every four years, but this is not feasible for anything that requires higher bandwidth or more frequent solicitation of our opinions.
However, historically, the level of acceptance among security researchers for ideas such as electronic voting has ranged from skepticism to hostility. Below is a good summary of the case against electronic voting. The content cited from the document:
There are many cases in the real world that can prove this suspicion is reasonable.
A Critical Analysis of Internet Voting in Estonia in 2014.
These arguments apply in various other contexts. But I predict that as technology advances, the response of "let's just not do it" will become increasingly impractical in many fields. The world is rapidly becoming more efficient due to technological development (for better or worse), and I predict that any system that does not follow this trend will become increasingly irrelevant as people bypass it. Therefore, we need an alternative: to really tackle those difficult tasks and figure out how to make complex technological solutions secure and verifiable.
In theory, "secure verifiable" and "open source" are two different things. In certain aspects, it is absolutely possible to be both proprietary and secure: airplanes are highly proprietary technology, but overall, commercial aviation is a very safe mode of travel. However, what proprietary models cannot achieve is secure consensus - that is, the ability to gain the trust of participants who do not trust each other.
Citizen systems such as elections are a crucial scenario for secure consensus. Another scenario is the collection of evidence in court. Recently, in Massachusetts, evidence from a large-capacity alcohol tester was deemed inadmissible because information regarding a malfunction in the test was found to have been concealed. The article cites as follows:
The due process of the court is essentially a domain that not only requires fairness and accuracy but also a consensus on fairness and accuracy—because without a consensus on the court doing the right thing, society can easily fall into a situation where people act on their own accord.
In addition to verifiability, openness itself has intrinsic advantages. Openness allows local communities to design systems for governance, identity, and other needs in a way that is compatible with local goals. If the voting system is proprietary, then a country (or province or town) wishing to try a new voting system will face greater difficulties: they either have to persuade the company to implement their preferred rules as a feature, or they must start from scratch, doing all the work to ensure its security. This increases the high costs of innovation in political systems.
In any of the aforementioned areas, a greater emphasis on open-source hacker ethics will grant local implementers more autonomy, whether they are individuals or part of governments or enterprises. To achieve this, open building tools need to be widely available, and infrastructure and codebases must be freely licensed to allow others to develop and build upon them. To minimize power disparities, copyright sharing licenses (Copyleft) are particularly important.
In the coming years, another important area of civic technology will be physical security. Unfortunately, I predict that the rise of drone warfare will make "low-tech security" no longer viable. Even if a country's laws do not infringe on personal freedoms, it is meaningless if that country cannot protect you from other nations (or unlawful enterprises or individuals) imposing their laws upon you. Drones make such attacks easier. Therefore, we need to take countermeasures, which will likely involve a large number of anti-drone systems, sensors, and cameras.
If these tools are proprietary, data collection will be opaque and centralized. If these tools are open and verifiable, then we have the opportunity to find better methods: secure devices can prove that they only output a limited amount of data under limited conditions and delete the rest. We could have a digitized physical security future that resembles a digital watchdog rather than a digital surveillance prison. We can imagine a world where public surveillance devices must be open source and verifiable, and anyone has the legal right to randomly select a surveillance device in public, then dismantle it and verify it. University computer science clubs could often use this as an educational activity.
###Open-source and verifiable method
We cannot avoid digital computers being deeply embedded in various aspects of our (individual and collective) lives. By default, we are likely to get digital computers built and operated by centralized companies, optimized for the interests of a few, with backdoors set by the governments of their respective countries, and most people in the world cannot participate in their creation or know whether they are secure. But we can try to find better alternatives.
Imagine a world like this:
Compared to today, this world is safer, freer, and participates more equally in the global economy. But to achieve such a world, more investment in various technologies is needed:
The deterministic view of cybersecurity in the 2000s is wrong: vulnerabilities (and backdoors) can be overcome. We "just" need to learn to prioritize security over other competitive objectives.
The openness and verifiability of each layer of the stack are very important.
###From here to there
A key difference between this vision and the more "traditional" technological vision is that it is more friendly to local sovereignty, individual empowerment, and freedom. Security is not achieved by searching the world and ensuring there are no bad actors anywhere, but rather by making the world more robust at all levels. Openness means openly building and improving every layer of technology, not just centralized planned open access API programs. Verification is not the exclusive domain of proprietary stamped auditors (who are likely colluding with the companies and governments that launched the technology) — it is a right of the people and a socially encouraged pastime.
I believe that this vision is stronger and more aligned with the fragmented global landscape of the 21st century. However, we do not have unlimited time to execute this vision. Centralized security measures, including more centralized data collection and backdoors, as well as simplifying verification to "Is this made by a trusted developer or manufacturer?", are rapidly evolving. For decades, attempts have been made to replace genuine open access with centralized methods. This attempt may have begun with Facebook's internet.org and will continue, with each attempt becoming more complex than the last. We need to act quickly to compete with these methods and publicly demonstrate to both the public and institutions that better solutions are possible.
If we can successfully achieve this vision, then one way to understand the world we live in is as a form of retro futurism. On one hand, we benefit from more powerful technologies that enable us to improve health, organize more efficiently and resiliently, and protect ourselves from new and old threats. On the other hand, the world we acquire regains some characteristics that people took for granted in 1900: infrastructure is freely dismantleable, verifiable, and modifiable by individuals to meet their own needs; anyone can participate, not just as consumers or "app developers," but at any level of the stack; anyone can be assured that devices will operate as claimed.
Verifiability in design comes at a cost: many software and hardware optimizations, while providing the much-needed speed improvements, result in designs that are harder to grasp or more fragile. Open source makes it more difficult to profit under many standard business models. I believe both of these issues are exaggerated—but this is not something that can convince the world overnight. This raises a question: what pragmatic goals should we pursue in the short term?
I will propose a solution: dedicated to creating a fully open-source and easily verifiable stack, aimed at high security and low-performance applications—whether consumer-facing or institutional, remote or face-to-face. This will encompass hardware, software, and biometric technology. Most computing that truly requires security does not usually need speed; even in cases where speed is required, there are often ways to combine high-performance but untrusted components with trusted but low-performance components, thereby achieving high levels of performance and trust for many applications. Achieving the highest security and openness for everything is unrealistic. But we can start by ensuring that these features are available in genuinely important areas.