Tap to Trade in Gate Square, Win up to 50 GT & Merch!
Click the trading widget in Gate Square content, complete a transaction, and take home 50 GT, Position Experience Vouchers, or exclusive Spring Festival merchandise.
Click the registration link to join
https://www.gate.com/questionnaire/7401
Enter Gate Square daily and click any trading pair or trading card within the content to complete a transaction. The top 10 users by trading volume will win GT, Gate merchandise boxes, position experience vouchers, and more.
The top prize: 50 GT.
.
So how were the earliest frozen assets implemented? Sui itself supports the
Deny listandRegulated tokensfunctionalities, and this time it directly called the freeze interface to lock the hacker’s address.The technical risks of left-behind strong power interventions
Although this move recovers most of the frozen assets, it is also worrying, because the upgrade of the protocol has forced the modification of the ownership of assets through node consensus, and it also indicates that Sui officials can replace any address for signature, so as to transfer the assets inside.
The constraint on whether the Sui official can do this is not the smart contract code, but the voting rights of the nodes. And who has control over the results of the node votes? It’s simply the large nodes that are capital-controlled by the foundation! This means that the stakeholders of the Sui official hold the most significant voice; even if there is voting, it’s merely a formality.
The user’s private key is no longer an absolute proof of control over assets; as long as the consensus of the nodes agrees, the protocol layer can directly override the permissions of the private key.
On the other hand, this achieves an efficient asset recovery and rapid freezing of assets, thanks to the built-in regulatory functions of Sui, which can quickly stop losses. The voting was completed within 48 hours, and the protocol upgrade was implemented.
However, in the author’s view, the
address aliasing featurehas set a dangerous precedent - the protocol layer can fabricate “legitimate operations” for any address, which lays the technical groundwork for authoritarian intervention.This series of operations to recover funds by Sui is merely a decision made from the perspective of user interests when user benefits conflict with the principles of decentralization. As for whether it violates the principle of decentralization, it seems to be unimportant for both users and Sui, after all, when questioned, they can respond that it was a “vote” decision.