TechFlow news, May 6 — According to a blog post by Vitalik Buterin, he detailed the security model evolution strategy for Ethereum Rollups. This model consists of three phases: Phase 0 (fully controlled by a security council), Phase 1 (intervention requires approval from 75% of the security council members), and Phase 2 (the security council can only intervene when a provable vulnerability exists).
Vitalik used mathematical modeling to demonstrate that, given each security council member has a 10% "failure" probability, Layer-2 networks should begin deployment directly at Phase 1 rather than remaining at Phase 0. He also noted that transitioning too early to Phase 2 is inadvisable, recommending instead to first strengthen the security of the underlying proof system. He suggested data providers (such as L2beat) should display audit and maturity metrics for proof systems.




