Learn about Stakin
What is your validator set-up?
Stakin operates validators for over 40 blockchain networks. As each network is different, we adapt the relevant infrastructure to the constraints and requirements of each network. First and foremost, the goal is to avoid double-signing risks or extended downtime events, which could lead to missed rewards or downtime slashing.
Stakin sets up a unique and segregated infrastructure for each network that does not interact with the rest of our networks and operations. We want to make sure that our infrastructure is specifically designed, dedicated, and optimized for each network where we operate. Typically, we over-provision our infrastructure (higher CPU, RAM, disks, etc.) to ensure we can handle periods of high network stress.
When possible, our validators operate behind geographically distributed sentry nodes to improve the reliability of the setup and add an extra layer of protection against potential DDOS attacks.
Our validators have redundancy to ensure we can switch to a redundant machine in case of downtime. We use a manual failover process with multiple team members double-checking the setup to ensure that there are no double-signing risks. We’ve found that most historical double-signing events from validators are due to errors in automated failover processes.
Our 24/7 monitoring and alerting processes enable us to prevent, notice, and resolve issues within reasonable downtime windows. We also take frequent snapshots of blockchain databases in case of failure of the redundant validator. These snapshots help us quickly recover from any malfunction/issue or errors on the redundant machines.
What is your teams expertise / track record?
Our talented global team has an excellent track record of execution in the Web3 ecosystem, artificial intelligence, cybersecurity and finance. With this combination of expertise, innovation, intellectual capital and diversity, we provide distinct and effective solutions for our clients and partners.
What is your monitoring set-up?
Stakin has 24/7 monitoring is to ensure that risks are minimized, and rewards are maximized.
Stakin has built its dashboards to track events at both the server and blockchain levels. For this purpose, we mainly use in-house built software and scripts that integrate with common dashboard solutions and notification/alerting across various company channels.
We also take advantage of open-source third-party and community solutions for redundancy.
Our company takes a proactive approach to server management, with alerts set at lower thresholds to prevent incidents and be able to work on the necessary troubleshooting or hardware upgrades before incidents happen.
By monitoring blockchain activity in addition to server activity, Stakin can get informed about potential network-level outages and take a participative approach towards troubleshooting with the other validators and community on how to resolve the issues.
How do you handle communication with networks?
The team has direct chats with core development teams, other peers, and network foundations in case of emergencies, such as unscheduled network upgrades, vulnerability discovery, network downtime, and attacks. In addition, Stakin maintains a security email address shared with development teams for security-related emergencies.
Do you have a business continuity policy?
Our processes are built to ensure that incidents are escalated and resolved as quickly as possible. In case of an incident such as node downtime, DDOS, or targeted attack, our priority is to secure the users' funds and avoid double-signing, then work on potential downtime risks while keeping the infrastructure secure. As a non-custodial staking service, client funds are not directly at risk, except for slashing in the event of prolonged downtime or double-signing.
Our infrastructure is purposefully built for business continuity, from the node set-up to the monitoring, as well as through thorough geographical provider diversification.
We operate a validator backup node or a quick sync set-up for redundancy with a regular snapshot for each network. Backup validator nodes run at different providers and in various data centers than the validator itself and can be activated under the manual redundancy process.
The infrastructure security and redundancy processes are frequently tested on testnet networks for training and preparation purposes.
How do you handle organizational security?
Stakin has implemented a strict Information Security Policy with rules for access to production infrastructure, including servers operating blockchain nodes and validators.
Our approach to security extends beyond technical teams, DevOps, and network operations, with regular training and education on multiple blockchain-related risks, such as phishing risks and human engineering.
Stakin frequently reviews best practices in the industry to adapt its information security management systems at the organizational level and ensure the security and reliability of the infrastructure and the security of the overall operations.
We also conduct frequent reviews of our different service providers (bare metal, cloud, or other IT services) to ensure they meet our quality, security, and reliability standards.
How do you handle key management?
Stakin is a non-custodial validator, meaning that customer funds are, and always will be, within the delegator's or client's possession. It is nonetheless essential to have security processes in place for internal validator keys, as key compromise could result in downtime or slashing events.
At Stakin, we store operational-related and validator keys in encrypted vaults and hardware devices which a threshold of selected key custodians can access.
What client data do you collect?
Stakin does not store any customer data. We may collect data from visitors on our website and dashboard. For more information, please visit our Privacy Policy page.
Is Stakin ISO 27001 certified?
Yes, the Information Security Management System at Stakin and our non-custodial node infrastructure have been certified in accordance with ISO 27001:2022 by Bureau Veritas
The Information Security Management System (ISMS) at Stakin encompasses the security of our Tendermint, Ethereum, and Substrate-based non-custodial node infrastructure within the highly reliable threshold validation and staking environment and includes the following:
- Organizational Controls
- People Controls
- Physical Controls
- Technological Controls
This enables our delegators to earn staking yield securely and reliably without compromising the custody of their assets.
Do you use multiple cloud service providers?
For diversification purposes, redundancy, latency, and due to specific dedicated node demands from clients (regulatory, compliance, or decentralization constraints), the infrastructure is deployed across a large number of data centers, hosting providers, and jurisdictions.
Our company uses a globally diversified network of bare metal and cloud providers. We deploy infrastructure on more than 10 leading providers globally operating from top-notch data centers in 4 regions and 10 countries. Our servers are deployed in Europe, North America, South America, and Asia.
In the case of dedicated and Whitelabel nodes, we can adapt the infrastructure for specific requirements such as compliance, latency, or decentralization and deploy it in some selected jurisdictions.
What services does Stakin offer?
Stakin offers following services:
- Non-custodial permissionless staking service
- Dedicated nodes
- Whitelabel services
- Slashing Protection & Insurance
- Tracking Dashboard
- Custom API services
Do you provide support?
Yes, with robust technical expertise, our excellent support team can assist clients with complex staking and network questions via preferred channels. We also set up dedicated channels for institutional clients, where we exchange on topics including market research and new protocols.
Do you provide reporting services?
Yes, with dedicated reporting services, our clients will benefit from clear and verifiable historical data to track your staked assets and performance. We offer different formats of reports (monthly, quarterly, yearly) which can be delivered via CSV or API. Institutional customers also get premium access to exclusive features on our dashboard.
Do you provide SLAs?
Our talented global team has an excellent track record of execution in the Web3 ecosystem, artificial intelligence, cybersecurity and finance. With this combination of expertise, innovation, intellectual capital and diversity, we provide distinct and effective solutions for our clients and partners.
Stakin Supported Assets
Other Supported Assets
Stakin Enterprise Staking Qualifications
Certifications
Contact/Team
Compliance
Value Added Services
Stakin Analytics
- 24h
- 7d
- 30d
- 90d
- 1y
- 24h
- 7d
- 30d
- 90d
- 1y
Stakin Staking Performance Charts
Track Stakin staking over time by analyzing key performance metrics.
Data Trusted by
& more