Ethereum co-founder Vitalik Buterin has warned that blockchain’s cryptographic guarantees end where external trust begins.
On October 26, Buterin explained that even a 51% attack cannot verify invalid blocks. This means that even if the majority of validators collude or experience software bugs, they cannot seize users’ funds or forge transactions.
Sponsored Sponsored
Buterin reignites debate on blockchain validators
This is because each blockchain node independently verifies new blocks and automatically rejects blocks that violate the rules of the protocol. This decentralized verification protects Ethereum from false ledger entries, even under majority control.
However, Buterin emphasized that this security guarantee only applies to blockchain protocols.
According to him, the moment users rely on validators for tasks outside of the framework, such as bridging assets, validating real-world data, and checking off-chain events, they enter a zone where trust replaces math.
In that area, the network itself provides no recourse if 51% of validators agree to a false statement.
Buterin’s comments reignited debate within the developer community. Many are currently wondering how much control validators should retain as blockchains adopt complex features such as bridges, oracles, and off-chain authentication.
Sponsored Sponsored
Polygon’s chief technology officer, Mudit Gupta, supported this warning.
However, he explained that while validators cannot change the state of Ethereum, they can “steal money” through Maximum Extractable Value (MEV) or even enforce censorship.
Others, however, opposed Buterin’s position.
Seun Lanlege, co-founder of Polkadot’s Hyperbridge, argued that the impact of validators runs deeper. He warned that a malicious majority could manipulate block propagation or isolate nodes through Eclipse attacks.
This reveals structural vulnerabilities that extend beyond MEV and censorship.
Adding another perspective, Robert Sasu, core developer at MultirsX, urged his team to minimize dependence on off-chain components.
“We create and move everything on-chain. We run it directly in the decentralized L1,” he said.
In his view, reliance on centralized systems such as bridges, oracles and price feeds invites manipulation. True resilience, he argued, comes from designing decentralized, permissionless, and configurable systems that minimize trusted intermediaries.
