Vitalik Buterin reiterated his concerns with L2 decentralization. He explained Base is a decentralized L2 chain, with no risks of censorship on transactions.Vitalik Buterin reiterated his concerns with L2 decentralization. He explained Base is a decentralized L2 chain, with no risks of censorship on transactions.

Buterin explains why Base is a secure and censorship-resistant L2

2025/09/23 15:40
3 min read

Vitalik Buterin spoke out in defense of Base, marking the importance of decentralized consensus for L2. The key safety issue is the ability of users to still move funds, even if the L2 stopped working. 

Vitalik Buterin spoke out on the key feature of L2 decentralization. While for some the issue is frivolous, Buterin explained L2s are not “glorified servers” sending transactions to Ethereum. Instead, the chains allow users to move their funds in a permissionless way, even if the L2 stops working. 

The feature is seen as key to awarding L2s decentralized status, and avoids potential losses in the case a chain decides to close. Buterin explained that L2s are non-custodial, and in the end cannot censor transactions, as it happened briefly on the Soneium chain. 

This level of security, however, still does not exclude financial risk, and cannot guarantee the safety of DEXs. The only achievement is that the DEX is not a custodian of funds. 

As Cryptopolitan reported earlier, Buterin is focusing again on L2 and their interaction with Ethereum. In December, Ethereum will also increase its capacity for L2 transactions, further boosting speed and lowering costs.

Are L2s capable of grabbing user funds?

Armani Ferrante, founder of the Backpack wallet and DEX, mentioned that in some cases, margin trading may require a form of custody and funds that are briefly locked by a third party, to achieve trading. Ferrante, who was an early hire of Alameda Research, aims to dispel fears of custodial overstepping and harming the rights of depositors. 

Sunil Kavuri, FTX creditor activist, warned that not all trading was the same, as in the case of Alameda Research, which directly grabbed and used deposits to FTX. 

So far, there is no data of a L2 chain being able to control user funds to a high extent, repeating the model of Alameda Research. Ethereum’s infrastructure still allows censorship-free, direct movements of L2 tokens. 

Jesse Pollak, founder of Base, explained the chain’s sequencer. He stated the Base sequencer works as a fast lane, but users were free to order Base transactions directly on Ethereum, with no censorship. This pathway to transacting may take longer to settle in some cases, suggesting sequencers can still affect some transactions, as users will have to accept delays.

L2 chains keep expanding activity

L2 chains keep expanding their activity, with 35% in value growth for the past year. As of September, the chains secure $54.9B in value, moving close to the previous all-time peak in late 2024. 

Vitalik Buterin: Base is a safe L2, modeling the protection of user funds.L2 chains post near-peak value and record activity. Vitalik Buterin once again reiterated that decentralization is a safety issue, to avoid centralized transaction censorship. | Source: L2Beat.

Base is also achieving new milestones, securing over $14.92B in value. The chain carries over $4B in stablecoins, through its native USDC. However, Arbitrum is once again the venue for bridged stablecoins, expanding from 4.9B to 9.33B in dollar-pegged tokens, including USDT, USDC, and other assets.

Overall, the stablecoin supply on top L2 chains is near an all-time high, based on demand for lending and trading.

Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

The post Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum appeared on BitcoinEthereumNews.com. A crypto whale lost more than $6 million in staked Ethereum (stETH) and Aave-wrapped Bitcoin (aEthWBTC) after approving malicious signatures in a phishing scheme on Sept. 18, according to blockchain security firm Scam Sniffer. According to the firm, the attackers disguised their move as a routine wallet confirmation through “Permit” signatures, which tricked the victim into authorizing fund transfers without triggering obvious red flags. Yu Xian, founder of blockchain security company SlowMist, noted that the victim did not recognize the danger because the transaction required no gas fees. He wrote: “From the victim’s perspective, he just clicked a few times to confirm the wallet’s pop-up signature requests, didn’t spend a single penny of gas, and $6.28 million was gone.” How Permit exploits work Permit approvals were originally designed to simplify token transfers. Instead of submitting an on-chain approval and paying fees, a user can sign an off-chain message authorizing a spender. That efficiency, however, has created a new attack surface for malicious players. Once a user signs such a permit, attackers can combine two functions—Permit and TransferFrom—to drain assets directly. Because the authorization takes place off-chain, wallet dashboards show no unusual activity until the funds move. As a result, the assets are gone when the approval executes on-chain, and tokens are redirected to the attacker’s wallet. This loophole has made permit exploits increasingly attractive for malicious actors, who can siphon millions without needing complex hacks or high-cost gas wars. Phishing losses The latest theft highlights a wider trend of escalating phishing campaigns. Scam Sniffer reported that in August alone, attackers stole $12.17 million from more than 15,200 victims. That figure represented a 72% jump in losses compared with July. According to the firm, the most significant share of August’s damages came from three large accounts that accounted for nearly half…
Share
BitcoinEthereumNews2025/09/19 02:31
Why is the Trump-backed WLFI Token Price Up Today?

Why is the Trump-backed WLFI Token Price Up Today?

The post Why is the Trump-backed WLFI Token Price Up Today? appeared first on Coinpedia Fintech News World Liberty Financial’s native token WLFI, backed by the
Share
CoinPedia2026/02/09 18:54
Unlock 24/7 Crypto Blackjack Customer Support Now

Unlock 24/7 Crypto Blackjack Customer Support Now

Cryptsy - Latest Cryptocurrency News and Predictions Cryptsy - Latest Cryptocurrency News and Predictions - Experts in Crypto Casinos Did you know BC.Game supports
Share
Cryptsy2026/02/09 19:33