Our validators’ infrastructure is built using tried and tested methods to shield them from unwanted traffic.
All infrastructure assets are connected to monitoring and alerting systems – for both incident response and overall maintenance.
All cryptographic material inside the firm is distributed using professional key management systems.
We participate in the networks we have deployed – in testnets, governance, documentation and more.
We play an active role in the underlying communities, to provide feedback and support.
When applicable, we use a percentage of our commission fees to provide quick grants to the community of builders in our networks.
We use premium grade data centers and cloud providers to provide the maximum possible uptime.
We distribute our infrastructure across multiple availability zones and providers.
We implement multiple instances (where applicable) to facilitate high availability.