Centralization Vulnerabilities in Crypto Infrastructure