Vitalik’s Golden Rule for Crypto Users: Low-Risk Transactions Should Be Easy, Dangerous Ones Hard
Coin Newsweek – February 22, 2026 – Ethereum co-founder Vitalik Buterin has shared a profound philosophical framework on the nature of security in blockchain systems, offering what many are calling a “golden rule” for crypto wallet designers and users alike.
In a comprehensive thread on X, Buterin redefined the very concept of security, arguing that it is fundamentally about minimizing the divergence between user intent and system behavior. This definition, he notes, is identical to how user experience can be defined, meaning the two fields are not separate but deeply intertwined.
How I think about "security":
The goal is to minimize the divergence between the user's intent, and the actual behavior of the system.
"User experience" can also be defined in this way. Thus, "user experience" and "security" are thus not separate fields. However, "security"…
— vitalik.eth (@VitalikButerin) February 22, 2026
The thread culminates in what may be its most practically valuable insight: a clear principle for balancing security and usability. “Security should not mean making the user click more for everything,” Buterin wrote. “Rather, security should mean: low-risk things should be easy (even automatic) to do, dangerous things should be hard to do. Getting this balance right is the difficulty.”
This deceptively simple formulation challenges the current state of many crypto applications, where users often face the same friction for both a $5 coffee purchase and a $50,000 transfer. The result, Buterin suggests, is either unnecessary annoyance or inadequate protection.
The post explores why perfect security is impossible. “The reason is not that machines are ‘imperfect’ or that the humans designing the machines are ‘imperfect,'” Buterin explains. “It is that ‘user intent’ is fundamentally an extremely complicated object that the user cannot easily access.”
He illustrates this with a simple example: when a user intends to “send 1 ETH to Bob,” even “Bob” is a complex entity that cannot be mathematically defined easily. While Bob can be represented by a public key or hash, the possibility that the public key or hash is not actually Bob becomes part of the threat model. Similarly, contentious hard forks raise subjective questions about which chain represents “ETH.”
Buterin outlines several examples of what good security solutions look like in practice:
- Type systems in programming: The programmer specifies both what the program does (the code) and what “shape” each data structure has. If these diverge, compilation fails.
- Formal verification: The programmer specifies both the code and the mathematical properties it must satisfy.
- Transaction simulations: Users specify an action, see a simulation of its on-chain results, then click “OK” or “Cancel.”
- Post-transaction confirmations: Transactions specify both the action and its expected effects; both must match for validity.
- Multisig / social recovery: Users specify multiple keys representing their authority.
- Spending limits, new address confirmations: For unusual or high-risk actions, users must reconfirm their intent.
The common pattern, according to Buterin, is that “there is no perfection, only risk reduction through redundancy.” Different redundant specifications approach the user’s intent from different angles—the action and expected results, the expected level of importance, economic bounds on downside, and so on.
Notably, Buterin also addressed the role of artificial intelligence in this framework. “Properly done LLMs are a simulation of intent,” he wrote. A general LLM is like a “shadow” of human common sense; a user-finetuned LLM is like a “shadow” of that user themselves, capable of distinguishing normal from unusual in greater detail.
However, he issued a crucial warning: “LLMs should not be trusted as the sole determinant of intent under any circumstances.” Rather, they represent one “angle” from which user intent can be approximated—an angle very different from traditional, explicit ways of encoding intent, which maximizes the usefulness of redundancy.
For wallet developers, DeFi protocols, and blockchain infrastructure providers, Buterin’s framework offers both philosophical depth and practical guidance. The “golden rule” of making low-risk actions easy and high-risk actions hard provides a clear design principle that could reshape how crypto interfaces are built.
As one community member responded to the thread: “This should be required reading for every web3 UX designer.”

