According to Jinse Finance, official Ethereum network documentation shows that Ethereum has officially deployed the Fusaka upgrade. This upgrade aims to improve the network’s transaction processing capability while maintaining existing security standards and levels of decentralization.
Ethereum co-founder Vitalik Buterin posted on the X platform on Wednesday night, saying: “Hearty congratulations to the Ethereum researchers and core developers who have worked hard over the years to make this achievement possible.”
The Fusaka upgrade was launched on Ethereum’s final testnet, Hoodi, in October. Its core is the EIP-7594 proposal—PeerDAS (Peer Data Availability Sampling protocol). This protocol allows Ethereum nodes to verify data integrity without downloading the full block data, achieving the core goal of “scaling without compromise” (i.e., increasing network capacity while retaining existing security parameters and decentralization features).
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Vitalik盛赞以太坊Fusaka升级
According to Jinse Finance, official Ethereum network documentation shows that Ethereum has officially deployed the Fusaka upgrade. This upgrade aims to improve the network’s transaction processing capability while maintaining existing security standards and levels of decentralization.
Ethereum co-founder Vitalik Buterin posted on the X platform on Wednesday night, saying: “Hearty congratulations to the Ethereum researchers and core developers who have worked hard over the years to make this achievement possible.”
The Fusaka upgrade was launched on Ethereum’s final testnet, Hoodi, in October. Its core is the EIP-7594 proposal—PeerDAS (Peer Data Availability Sampling protocol). This protocol allows Ethereum nodes to verify data integrity without downloading the full block data, achieving the core goal of “scaling without compromise” (i.e., increasing network capacity while retaining existing security parameters and decentralization features).