Security // Since 2019

Pre-committed,
not retrofitted.

In June 2019, before any institutional buyer was asking, we published our validator architecture: YubiHSM-backed keys, dual Tier III datacenters, VPN-only access. Seven years later, that posture is still the floor, not the ceiling.

descriptionFounding document · June 11, 2019 →
0Slashing events, lifetime
6yYubiHSM in production
5Lido DVT clusters signed
2Tier III datacenters
// 01 — Key management

Keys never leave the HSM.

The validator key is the entire security model. We put it behind a YubiHSM in 2019 and have not re-platformed the key boundary since.

YubiHSM 2 — dual datacenter, primary + backup

ACTIVE
Since June 2019

Two physical Key Management System servers, one in each datacenter, both equipped with YubiHSM 2 hardware security modules. One primary, one hot backup. Validator signing keys never exist outside the HSM boundary. This architecture has been our standard since day one of operations and is documented publicly from 2019.

verifiedFounding setup, June 11, 2019

Distributed Validator Technology (DVT) on Ethereum

ACTIVE
Since September 2023

First Obol DVT cluster deployed September 3, 2023 — 1,001 validators, 3-of-4 threshold, fully up in under 48 hours. Now a signed Node Operator in five Lido Simple DVT Module clusters: four with Obol, one with SSV. Each operating-rules acceptance is on-chain verifiable.

verified5 Lido DVT cluster signatures

Key isolation — signing segment separate from public

ACTIVE
Since June 2019

Validator signing keys live on a network segment that is not reachable from public-facing infrastructure. Validator nodes communicate with sentries and relayers only; there is no direct ingress to a signer.

Horcrux threshold signing — Cosmos ecosystem

ACTIVE

Threshold signing via Horcrux across Cosmos-ecosystem chains we validate. Removes single-key double-sign risk: a signature requires a quorum of our signer instances, no one of them can sign alone. Works behind the YubiHSM, not instead of it.

Web3Signer — Ethereum remote signer

ACTIVE

Web3Signer sits between our Ethereum validator clients and the YubiHSM-backed signing keys. Validator client compromise cannot extract the key; at worst it can request a signature that Web3Signer will slash-protect-check before releasing.

Validator key ceremony protocol

ACTIVE
Since 2019

Keys generated in-HSM, never exported. Access is dual-controlled; rotation events are logged, reviewed, and counter-signed.

// 02 — Network & infrastructure

Our own ASN, our own racks, our own failover.

AS211396 — our own autonomous system

ACTIVE

We operate AS211396 with BGP routing policy under our control, not rented from a cloud provider. Direct 20 Gbps+ peering to tier-1 carriers, not shared public-cloud ingress.

Two Tier III TIA-942 datacenters in Bucharest

ACTIVE
Since 2019

Active-passive deployment across two physically separate Tier III facilities. Manual failover with rehearsed procedures — no single point of failure shared with neighbour tenants.

140 Gbps DDoS mitigation at the edge

ACTIVE

Layer 3/4 volumetric attack mitigation at the facility boundary. Tier 1 transit provides scrubbing capacity before traffic enters our prefixes.

VPN-only infrastructure access

ACTIVE
Since June 2019

Access to any node — signer, validator, sentinel, monitoring — is only possible from a small set of known-good locations through VPN. No direct inbound SSH from the public internet has ever been permitted.

Sentinel and relayer topology (3–6 sentries per network)

ACTIVE
Since 2019

Validator nodes sit behind multiple sentries per network. Public RPC traffic never reaches a signing node directly. Published in the 2019 setup article.

Sub-second eBPF-based monitoring

ACTIVE

Standard Prometheus scrapes at 15-second intervals are too coarse for oracle and validator workloads. We operate a bespoke eBPF probe stack that alerts on the shape of a single oracle report cycle or block-production window.

verifiedTechnical write-up
// 03 — Operational security

The humans are the hardest path to compromise.

Phishing-resistant MFA for ops team

ACTIVE

Hardware-backed FIDO2 / WebAuthn passkeys for all administrative systems. No SMS-based 2FA is permitted anywhere in the ops pipeline — it is explicitly disallowed.

Named on-call engineering

ACTIVE

Every validator has a named accountable engineer. Incident response is handled by people with context on the chain, not a ticket queue.

Chain upgrade discipline — internal testnet first

ACTIVE

Every chain upgrade is applied to our internal testnet infrastructure before production. We do not upgrade on day one unless we have personally verified the binary.

Double-sign protection

ACTIVE

Key-ownership lock files and HSM-level constraints make a double-sign by our own infrastructure non-physical. Zero slashing events across 40+ mainnets in 6 years.

// 04 — Certifications & assurance

Independent verification, in progress and planned.

ISO 9001 — Quality Management

ACTIVE

Certified under ISO 9001, covering operational quality across validator and RPC services.

SOC 2 Type II

PLANNED

On the 2026-2027 compliance track. Target: engage a Tier 1 auditor for a Type I readiness assessment, followed by the Type II observation window. Our existing ISO 27001 ISMS maps most of the SOC 2 Security common criteria, reducing the gap materially.

MiCA CASP authorisation

PLANNED

Filing track under EU Markets in Crypto-Assets regulation, in preparation for full MiCA enforcement from July 1, 2026.

Independent penetration test — Tier 1 vendor

PLANNED

Annual external penetration test engagement with a top-tier security firm. Executive summary will be made available to counterparties under NDA.

Bug bounty programme

PLANNED

Scoped programme via Immunefi for validator infrastructure, oracle node, and public RPC surfaces.

// 05 — Responsible disclosure

Report something. We will reply.

bug_report

Security contact

We accept vulnerability reports on validator infrastructure, oracle nodes, public RPC endpoints, and the marketing site. Encrypt sensitive reports with our PGP key or use a secure channel of your choice.

Response SLA< 48h acknowledgement
Report a vulnerability
gavel

Safe harbour

Good-faith research conducted under this policy will not be pursued as unauthorised access under Romanian or EU law. In scope: our owned systems at 01.ro and validator endpoints we operate. Out of scope: third-party protocols, upstream vendors, social engineering of our team, and denial-of-service testing.

  • Do not exfiltrate or retain user data
  • Do not disrupt service or break continuity
  • Give us reasonable time to remediate before disclosure
  • We credit reporters on request after a fix ships
$ 01.ro --security --verify
KEY_STORE: YUBIHSM2 · DUAL_DC · SINCE 2019-06
DVT_ETHEREUM: 5 LIDO SIMPLE_DVT CLUSTERS · 4 OBOL + 1 SSV
NETWORK: AS211396 · 20GBPS+ PEERING · 140GBPS DDOS
DATACENTERS: 2 TIER_III TIA-942 · ACTIVE-PASSIVE
ACCESS: VPN_ONLY · FIDO2_PASSKEYS · NO_SMS_2FA
CERTS: ISO_27001 · ISO_9001 · STAKINGREWARDS_AA
SLASHING_EVENTS_LIFETIME: 0
DISCLOSURE: /.well-known/security.txt
shield_lock

Running a vendor review on us?

Request the full trust pack: certifications, policies, DPA template, architectural diagrams, and historical incident review — delivered under NDA.