share
arrow_backBack to Blog
Engineering|14 MIN READ|APR 30, 2026

DVT Explained: Obol vs. SSV vs. Diva — How Distributed Validator Technology Actually Works

The 2-of-3 cluster, the 4-of-7 mesh, the threshold signature scheme that makes a single operator compromise meaningless. We break down what Distributed Validator Technology is, how Obol Charon and SSV Network differ structurally, where Diva fits, and why Lido is now running its institutional staking pool through DVT clusters.

terminal

01node Team

Infrastructure Engineers

In 2023 the dominant Ethereum validator architecture was a single key on a single signer behind a single operator. By 2026, the most-staked Ethereum delegation pool — Lido Finance — runs a meaningful fraction of its capacity through Distributed Validator Technology clusters. The transition is not cosmetic. It changes the security model of staking at a structural level, and operators who do not participate in DVT are not running the architecture institutional capital underwrites today.

This article is an end-to-end explainer of DVT: what threshold-signing actually does cryptographically, how the three production implementations differ (Obol Charon, SSV Network, Diva), and what role each one plays in the Lido institutional staking story. We have skin in the game — 01node operates 5 Lido Simple DVT Module clusters, 4 with Obol and 1 with SSV — so this is also a description of architectures we run rather than ones we read about.

The single-validator problem

A traditional Ethereum validator is one signing key, controlled by one operator, signing on one node (or on a primary plus a passive backup). Two failure modes have produced most of the slashing events in the network’s history.

Single-host compromise. An attacker compromises the signing host — through a kernel zero-day, a side-channel attack, or insider abuse — and can produce arbitrary signatures with the validator’s key. The defence is HSM-backed key custody, which prevents key extraction, plus VPN-only access, which makes the host unreachable. These defences are necessary but not sufficient.

State-desync double-signing. The validator client crashes, restarts, comes back with stale state, and produces a signature for a height it has already signed. Or two replicas of the validator end up running concurrently — one in each datacenter, neither aware of the other — and both sign. The defence is a slashing-protection database, but the defence depends on a single integrated state machine that cannot diverge. When operators fail, this is usually how they fail.

Distributed Validator Technology removes both failure modes by removing the "single" from "single signer".

What threshold signing actually does

The cryptographic primitive underlying DVT is threshold signature schemes. A threshold signature is a digital signature that is produced jointly by multiple parties, where any subset above a threshold can produce a valid signature, but no subset below the threshold can. The full key never exists in any single party’s possession.

Concretely: in a 3-of-4 threshold scheme, four parties each hold a key shard. To produce a valid signature on a message, any three of the four parties compute partial signatures using their shards, and the partial signatures are aggregated into a single valid full signature. The fourth party can be offline; the signature is still valid. But a single party — even with their shard plus the message — cannot produce a valid signature alone.

The mathematical guarantees are strong: an adversary that compromises only k-1 of n parties (where k is the threshold) learns nothing about the underlying key and cannot forge any signature. This is fundamentally different from naive key-splitting (which can be reassembled from shares); a true threshold signature never reconstructs the key at all.

For Ethereum, the relevant threshold scheme is BLS threshold signatures because Ethereum’s consensus uses BLS signatures natively. This means a DVT-produced signature is indistinguishable from a regular validator signature on-chain — Ethereum sees a single valid validator signature; the threshold mechanism is invisible to consensus.

Obol Network and Charon

Obol Network is one of two production DVT implementations widely used today. Its core is Charon, a middleware that sits between Ethereum validator clients (Lighthouse, Prysm, Teku, etc.) and the network, coordinating threshold signing across multiple operators in a cluster.

A typical Obol cluster is 4 operators with a 3-of-4 threshold. Each operator runs Charon on their own infrastructure, with their own shard of the validator key. When a duty is required (block proposal, attestation, sync committee message), the four Charon instances communicate over a peer-to-peer network, each computes its partial signature using its shard, and three of the four partials combine into a valid signature. If one operator is offline, the other three still produce a valid signature; the cluster maintains liveness.

Operationally, Obol is operator-coordinated. Cluster formation happens through a defined ceremony — a Distributed Key Generation (DKG) ritual where all operators generate their key shards together and verify each others’ participation. Once the cluster is live, Obol runs as a daemon alongside each operator’s validator client, with no central coordinator.

Lido’s Simple DVT Module is the largest production deployment of Obol. 01node operates four Obol-based clusters within this module: Bountiful Bison, Quixotic Quail, Unfettered Urial, and Ethereal Elf. Each cluster’s on-chain operating-rules acceptance is verifiable on Etherscan; the signatures are listed at /operator-credentials.

SSV Network

SSV Network — Secret Shared Validators — is the second major DVT implementation in production. It operates as a permissionless network of validator operators rather than as coordinated clusters.

In the SSV model, an Ethereum validator key is split into shares using BLS threshold cryptography. Validators choose 4 or 7 operators from the SSV operator network to hold those shares. A 3-of-4 or 4-of-7 quorum is required to sign. The operators do not need pre-existing relationships — they simply need to be registered on the SSV network.

SSV Network adds an economic layer that Obol does not have at the protocol level. Operators charge a per-validator fee for their participation, paid from validator rewards. The market sets prices; operators with high uptime and good reputation can charge more.

For institutional staking products, SSV provides operator pluggability — a staking pool can include or exclude specific operators by selecting them at validator-registration time. This is useful for compliance scenarios where a pool wants to ensure none of its operators are jurisdictionally restricted.

01node was a Launch Partner with SSV Network during its permissioned phase, achieving 99.78% uptime in the first 30 days. We currently operate one SSV-based cluster within Lido’s Simple DVT Module — Resilient Rabbit.

Diva

Diva is a third DVT implementation, with a different architectural emphasis. Where Obol and SSV focus on operator-coordinated clusters, Diva targets a more pooled-staking-friendly design: anyone can deposit ETH into the Diva pool, the pool combines deposits into 32-ETH validators, and each validator is operated as a DVT cluster across the Diva operator set.

Diva positions itself for retail and middle-market staking rather than for the institutional cluster model. As of mid-2026, Diva is still smaller in market share than Obol and SSV, but its design has merit for pooled staking products that want DVT security without operator-coordination complexity.

For institutional operators like 01node, Obol and SSV are the production-relevant implementations because the institutional Lido Simple DVT Module runs on those two. Diva is on the watchlist for emerging pool products.

The Lido Simple DVT Module

Lido is the largest Ethereum staking pool, and its Simple DVT Module is the largest production deployment of DVT. The module exists to give Lido a path to onboard a wider operator set under DVT-enforced safety, rather than relying solely on the curated set of operators in the original Lido Curated Module.

The Module’s design works like this: operators apply to participate, sign an on-chain operating-rules acceptance document, and are assigned to clusters. Each cluster runs as either Obol or SSV. The 32-ETH stake required to spawn a validator comes from the Lido pool; the operators provide infrastructure and signing services in exchange for a share of validator rewards.

For Lido delegators (anyone who holds stETH), the Module is invisible — they hold stETH, the protocol allocates their stake among modules, and the underlying validators sign blocks. The Module is the implementation detail that makes Lido more decentralised and slashing-resilient at the operator level.

For operators in the Module — including 01node — the responsibility is real. Each cluster has on-chain accountability via the operating-rules acceptance signature. Misbehaviour by a cluster (even by another operator within the same cluster) is reflected in our cluster’s public performance record.

Comparison: where each fits

For an operator deciding which DVT system to participate in, or for a delegator deciding which DVT-secured product to use, the practical comparison is:

- Obol Network. Strongest for operator-coordinated clusters with established trust between operators. Used heavily in Lido Simple DVT. Charon middleware integrates with all major Ethereum validator clients. Cluster formation is a real ceremony, which is good for security and slow for new-cluster bring-up. - SSV Network. Strongest for permissionless or programmable cluster composition. Operators are interchangeable and pluggable; pool products can build operator-set governance into their workflow. Per-validator economic model is more legible but adds complexity. - Diva. Strongest for pooled retail staking products that want DVT security without requiring delegators to think about cluster mechanics. Smaller market share to date but credible design.

For institutional delegators, the practical question is: "does the delegation product I’m considering run validators with DVT, and if so, which operators are in the cluster?" Lido stETH holders are running on a mix that includes Obol and SSV clusters; Coinbase and Kraken pooled products typically do not run DVT yet (that may change).

Why DVT matters even when nothing goes wrong

The strongest argument for DVT is not that it prevents slashing — though it does. The strongest argument is that it changes the conversation about validator security from "trust us" to "you don’t have to trust any single one of us".

In the single-operator model, an institutional delegator’s slashing exposure depends entirely on one operator’s controls. The delegator must do a deep diligence on that operator — key custody, infrastructure, ops discipline — and then trust the answer.

In a DVT model, the slashing exposure depends on multiple operators. A single bad actor or a single host compromise does not produce a valid signature. Slashing requires collusion or simultaneous compromise across multiple independently-operated environments. The bar moves from "one operator has to be honest and secure" to "a quorum of operators has to be honest and secure".

For institutional capital, that bar is materially easier to underwrite. It is also why Lido’s Simple DVT Module and similar institutional staking products will, over the next 18 months, capture a growing share of the staking-pool market relative to traditional single-operator pools.

How 01node fits in

We participate in DVT for the same reason we run YubiHSM-backed key custody and Horcrux threshold signing on the Cosmos side: both make the slashing surface harder to hit, and both signal to institutional counterparties that we are operating at the bar regulated capital wants.

We are signed Node Operators in five Lido Simple DVT clusters. Each cluster’s operating-rules acceptance is on-chain verifiable on Etherscan. Our slashing record across these clusters and across all 40+ mainnets we operate remains zero events in six years.

For institutional counterparties evaluating us, the DVT participation is one of three trust signals worth verifying independently. The other two are the YubiHSM custody history (documented publicly since June 2019) and the Chainlink Channel Partner status (also a 2020-onwards on-chain track record). All three are at /operator-credentials with linked evidence.

DVT is not magic. It is a specific cryptographic design that solves specific failure modes that traditional validator architectures do not solve. Operators who participate in DVT-based products are signalling that they are willing to operate inside a model where their own infrastructure is not the only trust assumption. Operators who decline are signalling something different.

StakingInfrastructureValidatorEngineering01node

Share this article

Help others discover quality infrastructure insights.

ShareLinkedIn
mail

Stay updated

Follow us for more technical insights, infrastructure deep-dives, and ecosystem updates.