Keom Protocol
  • Keom Protocol
  • About Keom
    • ⚙️Products
    • 🛡️Security
      • ✅Audits
      • 🦸‍♂️Security Approach
        • Continuous stress-testing
        • Asset due diligence
        • AMM slippage modelling
        • Toxic liquidation spirals
        • Security Partners
    • 🏛️Organisation
      • 🎮Legal Entity
      • 👾Community
  • How it works
    • Lending Pools
      • Pool Types
      • Supply
        • Supply Assets
        • kTokens
        • Interest
        • Rewards
      • Borrow
        • Borrow
        • Health Factor
        • Liquidation Probability
        • Liquidation
      • Withdraw & Repay
      • Interest rate model
  • 🔴INTERFACE TERMS OF USE
    • Terms of Use
    • Definitions
    • Restricted Jurisidictions
    • ⛔Prohibited Uses
    • You acknowledge and accept
      • About the Interface
      • About the Protocol
      • About Listed Assets
      • About Yield and Rewards
      • About the Association
    • You represent and warrant
      • About yourself
      • About your understanding
    • Regulations
    • Access Restrictions
    • Fees
    • Downtime
    • Shutdown
    • Indemnification Clause
    • Absence of warranties
    • Liability
    • Applicable Law and Jurisdiction
    • Risk Disclosure
      • ‼️Important Reminders
      • Technology Risk
        • Blockchains
          • General Blockchain Risk
          • L1 vs L2
            • Ethereum
            • Polygon PoS
            • Polygon zkEVM Beta
            • Polygon CDK
          • Testnet vs Mainnet
        • Bridges
        • Crypto Assets
        • Oracles
        • Wallets
      • Financial Risk
      • Regulatory Risk
      • Systemic Risk
  • Developers
    • Contract Addresses
      • Polygon PoS
      • Polygon zkEVM
      • Manta Pacific
      • Astar
      • X1-Testnet
    • Key Events
    • Exchange Rate
    • Dynamic Liquidation Parameters
    • Oracles
  • Support
    • FAQ
    • Video Tutorials
  • References
    • Social Media Links
    • Brand Materials
Powered by GitBook
On this page
  1. INTERFACE TERMS OF USE
  2. Risk Disclosure
  3. Technology Risk
  4. Blockchains
  5. L1 vs L2

Ethereum

PreviousL1 vs L2NextPolygon PoS

Last updated 1 year ago

Detailed information on that L1 and risks associated therewith can be found and is summarized for your convenience below.

Ethereum is considered a secure blockchain due to its robust architecture, long-standing track record, and continuous improvements in security practices. Its security is upheld through several key factors:

  • Decentralized Consensus and the transition to Ethereum 2.0: PoS, implemented in the Beacon Chain, replaced mining with validators who secure the network by staking cryptocurrency. This shift enhances not only energy efficiency and reduces the risk of centralization.

  • Smart Contract Audits: The Ethereum community emphasizes rigorous security audits for smart contracts to identify and rectify potential flaws. These audits ensure that smart contracts function as intended and are resistant to attacks.

  • Vibrant Developer Community and Constant Upgrades: Ethereum has a vast and active developer community, with security experts consistently contributing to the improvement of the platform's security infrastructure in line with best practices. Ethereum's frequent network upgrades introduce improvements in security protocols and mechanisms to enhance the network's resilience against potential threats. This collective effort helps identify and address vulnerabilities quickly.

  • Past Incidents and Learning: Ethereum's history includes incidents like the DAO hack, which led to a hard fork to reverse the exploit. These events prompted the Ethereum community to enhance security practices and prioritize code audits.

🔴
here