Cryptomonnaies

The Merge Doesn’t Solve Ethereum’s ‘Atomic Composability

The Merge of Ethereum’s network is a significant accomplishment in the history of open-source software and Web3. For the most part, this transition from the more energy-intensive proof-of-work consensus mechanism to the less energy-intensive proof-of-stake has been celebrated for its increased sustainability.

But while the story of the day is about energy conservation, the Merge skirts a looming problem for Ethereum. Network updates after the Merge are intended to finally begin improving Ethereum’s scalability – but these proposals threaten the viability and sustainability of a healthy Web3 ecosystem.

“Atomic composability,” which made decentralized finance (DeFi) on Ethereum possible to begin with, becomes compromised. And when you break atomic composability, you hinder the very thing that makes an ecosystem truly sustainable long-term.

What is atomic composability and why does it matter?

Atomic composability is a technical term for saying that any application on a network can frictionlessly interact with any other application. Ethereum is going to consciously break composability by segregating parts of its network from each other in the implementation of sharding or layer 2 systems.

To make this concept more concrete, let’s consider the health of a rainforest or a desert.

Without pollinators, one-third of all our edible fruits and vegetables could not grow, according to experts.

You’ve most likely heard about the declining bee population, but the story repeats itself over and over and over again all over the world. The destruction of agave plants for tequila production jeopardizes the survival of the bats that pollinate the most important cactus in the desert, putting the entire ecosystem at risk. Whaling ultimately leads to the destruction of fish stocks.

 

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières Le 17…

1 jour ago

Cybersécurité des transports urbains : 123 incidents traités par l’ANSSI en cinq ans

L’Agence nationale de la sécurité des systèmes d'information (ANSSI) a publié un rapport sur les…

1 jour ago

Directive NIS 2 : Comprendre les obligations en cybersécurité pour les entreprises européennes

Directive NIS 2 : Comprendre les nouvelles obligations en cybersécurité pour les entreprises européennes La…

3 jours ago

NIS 2 : entre retard politique et pression cybersécuritaire, les entreprises dans le flou

Alors que la directive européenne NIS 2 s’apprête à transformer en profondeur la gouvernance de…

4 jours ago

Quand l’IA devient l’alliée des hackers : le phishing entre dans une nouvelle ère

L'intelligence artificielle (IA) révolutionne le paysage de la cybersécurité, mais pas toujours dans le bon…

5 jours ago

APT36 frappe l’Inde : des cyberattaques furtives infiltrent chemins de fer et énergie

Des chercheurs en cybersécurité ont détecté une intensification des activités du groupe APT36, affilié au…

5 jours ago

This website uses cookies.