The data advocates for at least Stage 1 deployment, especially as proof systems mature. Still, Buterin warns against prematurely shifting to Stage 2 if it detracts from strengthening the underlying cryptographic mechanisms.