Tap to Trade in Gate Square, Win up to 50 GT & Merch!
Click the trading widget in Gate Square content, complete a transaction, and take home 50 GT, Position Experience Vouchers, or exclusive Spring Festival merchandise.
Click the registration link to join
https://www.gate.com/questionnaire/7401
Enter Gate Square daily and click any trading pair or trading card within the content to complete a transaction. The top 10 users by trading volume will win GT, Gate merchandise boxes, position experience vouchers, and more.
The top prize: 50 GT.
.
So how was the earliest frozen assets realized? Sui itself supports the Deny list (frozen list) and Regulated tokens (regulated tokens) functionalities, and this time it directly called the freezing interface to lock the hacker’s address.
The technical risks of left-behind authoritarian interventions
Although this move has recovered most of the frozen assets, it also raises concerns because the upgrade of the protocol has forcibly modified the ownership of the assets through node consensus, which also suggests that the Sui officials can replace any address for signing, thereby transferring the assets contained within.
Whether the Sui official can do this is not determined by the smart contract code, but by the voting rights of the nodes. And who holds the results of the node voting? It is simply the large nodes controlled by the capital of the foundation! In other words, the stakeholders of the Sui official hold the greatest say, and even if there is voting, it is merely a formality.
The user’s private key is no longer an absolute proof of control over assets; as long as the node consensus agrees, the protocol layer can directly override the permissions of the private key.
On the other hand, this achieves an efficient asset recovery, allowing for the rapid freezing of assets, thanks to the built-in regulatory features of Sui, which can also quickly stop losses. Voting was completed within 48 hours, and the protocol upgrade was implemented.
However, in the author’s view, the address aliasing function has set a dangerous precedent—at the protocol level, it can forge any address’s “legitimate operation,” which lays the technical groundwork for authoritarian intervention.
The series of operations to recover funds by Sui this time was simply a decision made by the public chain to prioritize user interests when there was a conflict with the principles of decentralization. Whether this contradicts the principle of decentralization seems unimportant to both users and Sui, after all, they can respond to skepticism by stating that it was a “vote” that decided.