Try Try (@trytrythree) 's Twitter Profile
Try Try

@trytrythree

ID: 2748245242

calendar_today20-08-2014 17:24:45

670 Tweet

211 Followers

2,2K Following

sassal.eth/acc 🦇🔊 (@sassal0x) 's Twitter Profile Photo

The Ethereum testnet, Hoodi, has been successfully upgraded to Fusaka! This was the final testnet being upgraded and it went quite smoothly! Now that the testnets have been upgraded, Fusaka should land on mainnet in early December.

Justin.eth Drake (@drakefjustin) 's Twitter Profile Photo

🤯 two 5090s now prove every L1 EVM block 🤯 The ZKsync Airbender team pulled off something insane ahead of tomorrow's ethproofs.day demo. Mainnet proofs on two gaming GPUs. One box, ~1kW—basically a toaster. Props to robik (∎, ∆) zk/acc, Michael Carrili, MM, Alexander Vlasov.

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

Welcome to 2026! Milady is back. Ethereum did a lot in 2025: gas limits increased, blob count increased, node software quality improved, zkEVMs blasted through their performance milestones, and with zkEVMs and PeerDAS ethereum made its largest step toward being a fundamentally

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

One metaphor for Ethereum is BitTorrent, and how that p2p network combines decentralization and mass scale. Ethereum's goal is to do the same thing but with consensus. Another metaphor for Ethereum is Linux. * Linux is free and open source software, and does not compromise on

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

Increasing bandwidth is safer than reducing latency With PeerDAS and ZKPs, we know how to scale, and potentially we can scale thousands of times compared to the status quo. The numbers become far more favorable than before (eg. see analysis here, pre and post-sharding

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

I agree with maybe 60% of this, but one bit that is particularly important to highlight is the explicit separation between what the poster calls "the open web" (really, the corposlop web), and "the sovereign web". x.com/tom777kruise/s… This is a distinction I did not realize

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

In 2014, there was a vision: you can have permissionless, decentralized applications that could support finance, social media, ride sharing, governing organizations, crowdfunding, potentially create an entire alternative web, all on the backs of a suite of technologies.

In 2014, there was a vision: you can have permissionless, decentralized applications that could support finance, social media, ride sharing, governing organizations, crowdfunding, potentially create an entire alternative web, all on the backs of a suite of technologies.
vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

2026 is the year we take back lost ground in computing self-sovereignty. But this applies far beyond the blockchain world. In 2025, I made two major changes to the software I use: * Switched almost fully to fileverse.io (open source encrypted decentralized docs) *

Justin.eth Drake (@drakefjustin) 's Twitter Profile Photo

Today marks an inflection in the Ethereum Foundation's long-term quantum strategy. We've formed a new Post Quantum (PQ) team, led by the brilliant Thomas Coratger (Thomas Coratger). Joining him is Emile, one of the world-class talents behind leanVM. leanVM is the cryptographic

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

There have recently been some discussions on the ongoing role of L2s in the Ethereum ecosystem, especially in the face of two facts: * L2s' progress to stage 2 (and, secondarily, on interop) has been far slower and more difficult than originally expected * L1 itself is scaling,

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

Two years ago, I wrote this post on the possible areas that I see for ethereum + AI intersections: vitalik.eth.limo/general/2024/0… This is a topic that many people are excited about, but where I always worry that we think about the two from completely separate philosophical

Two years ago, I wrote this post on the possible areas that I see for ethereum + AI intersections: vitalik.eth.limo/general/2024/0…

This is a topic that many people are excited about, but where I always worry that we think about the two from completely separate philosophical
vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

Now, the quantum resistance roadmap. Today, four things in Ethereum are quantum-vulnerable: * consensus-layer BLS signatures * data availability (KZG commitments+proofs) * EOA signatures (ECDSA) * Application-layer ZK proofs (KZG or groth16) We can tackle these step by step:

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

Now, scaling. There are two buckets here: short-term and long-term. Short term scaling I've written about elsewhere. Basically: * Block level access lists (coming in Glamsterdam) allow blocks to be verified in parallel. * ePBS (coming in Glamsterdam) has many features, of

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

Now, execution layer changes. I've already talked about account abstraction, multidimensional gas, BALs, and ZK-EVMs. I've also talked here about a short-term EVM upgrade that I think will be super-valuable: a vectorized math precompile (basically, do 32-bit or potentially

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

I think it's healthy for us in the Ethereum world to have a more bold and open mindset to many things, particularly on the application layer and on how we see ourselves in the world. We should not compromise on core properties: censorship resistance, open source, privacy,

vitalik.eth (@vitalikbuterin) 's Twitter Profile Photo

I was recently at Real World Crypto (that's crypto as in cryptography) and the associated side events, and one thing that struck me was that it was a clarifying experience in terms of understanding *what blockchains are for*. We blockchain people (myself included) often have a

Erik Voorhees (@erikvoorhees) 's Twitter Profile Photo

"Every major AI platform — ChatGPT, Claude, Gemini, Grok, Perplexity — stores your conversations on centralized servers. That data can be reviewed, classified, subpoenaed, hacked, or sold. You're trusting the company, its employees, its vendors, and every government that asks.