We employ advanced encryption protocols to safeguard your data, both in transit and at rest. Our blockchain architecture ensures that all transactions are secure, immutable, and verifiable.
Our systems are protected by multi-factor authentication (MFA) and role-based access controls (RBAC), ensuring that only authorized personnel have access to sensitive information.
We utilize continuous monitoring and threat detection tools to identify and mitigate potential vulnerabilities. Our security team is on alert 24/7 to respond to any incidents swiftly.
Regular security audits are conducted by both internal and external experts to ensure our systems remain robust against emerging threats. We also engage in bug bounty programs to leverage the expertise of the broader security community.
We comply with all relevant regulatory frameworks and standards, including anti-money laundering, GDPR, and ISO/IEC 27001.
To find out more, check out our security page for detailed information.
Transparency is key to our operations. We are transparent on any incidents that may affect the compliance, security and privacy of our clients.
All smart contracts deployed on our platform undergo rigorous audits to ensure they are free from vulnerabilities and function as intended. We partner with leading blockchain audit firms to validate our smart contracts.
Our crypto optimized Infrastructure is engineered for maximum security.
Blockdaemon Crypto Optimized Infrastructure can help you reduce your environmental impact and achieve your ESG initiatives.Our environmentally friendly bare metal blockchain infrastructure uses renewable energy wherever possible. We only open new data centers with environmentally friendly credentials. We only use cloud partners who share our commitment to green energy.
Our Crypto Optimized Infrastructure is powered by clean energy including wind and hydro.
To find out more, check out our infrastructure page for detailed information.
We stand behind our services. We guarantee slashing when we are at fault. We have insurance policies in place that help cover slashing, downtime and/or missed rewards that may occur across its supported networks. We work with Marsh, the world’s leading insurance broker and risk advisor, to create this best-in-class service that caters to Fortune 500 enterprises, banks, custodians, and trusts.
Blockdaemon employs a cadre of engineers who monitor the performance and health of its software systems 24/7 in a follow-the-sun protocol. When issues are identified, the relevant employee will alert team members and senior management, document the issue in a ticket and begin to resolve the issue in accordance with documented runbook procedures.
Our crypto-optimized infrastructure is engineered for maximum security. We keep your nodes safe, with 70+ terabit DDoS protection, ensuring bad actors can’t impact your rewards by taking your nodes offline.
All employees and contractors undergo pre-screening and background checks to ensure they are qualified and trustworthy. Periodic re-screenings maintain security standards. Employees receive regular training on the latest security protocols and best practices, safeguarding the integrity and reliability of Blockdaemon’s operations.
Our engineers are designated duties that are explicitly restricted to the information that they need to know. All production secrets are used by service accounts, which means that an engineer never needs access to production environments directly, nor the respective secrets required for deployment.
We collect and use only the data necessary to provide our services to you.
You have full control over your data, access, and delete your data in compliance with privacy regulations.
We protect your data with our advanced security and encryption.
Integrity is at the core of our operations. We are committed to conducting our business ethically and transparently, with a focus on building long-term trust with our stakeholders.
We are dedicated to sustainable practices in our operations and are constantly exploring ways to minimize our environmental impact, particularly in the energy consumption of our blockchain infrastructure.
We believe in the power of community and actively engage with our users, partners, and the broader blockchain ecosystem to promote innovation, education, and inclusivity.
Holders of the Network’s token who choose to stake these tokens to the protocol in order to participate in the network’s consensus mechanism. At all times throughout the staking process, the Delegator maintains control of the private keys associated with this address and has full control of the movement of tokens in and out of that address, subject to any bonding period set by the protocol.
A node, configured with the protocol’s software, that operates as the primary method for producing new blocks of the Network. It does this by selecting and ordering the transactions to be included in the next block of the chain and creates that block per the protocol rules, in order to keep consensus on the blockchain.
Validator nodes act as access points for delegators to participate in the protocol’s consensus mechanism, but they do not control access. A delegator can choose to simply undelegate from a specific validator and re-delegate through another validator.
Validators can be made up of multiple machine node types, a single machine node, or multiple validators on a single machine. The exact configuration of a validator node is dependent on the processing power required by a particular protocol.
A Validator typically has a keypair - public and private. Public keys are the Validator’s onchain identity, and the private key is used to control that identity on chain (ie. set the validator to active or inactive, set parameters like Commission Fee rate or plain text name). The actions the Validator can perform are set by the Network.
Validator Keys are NOT able to control Delegator’s funds. Please note that the Validator Keys are different to the public-private key pair controlling the delegator’s wallet address.
Depending on the network, a Validator may have one keypair (Public and Private), or there are multiple keys that control and operate various functions.
Tokens required on the Validator keys are typically the minimum self-stake required for the Validator to be activated, which is separate from the Delegator’s staked funds. The Network sets the minimum self-stake a Validator is required to have, and can sometimes be as little as 1 Token.
Token distributions made by the protocol if a Validator Node is chosen to validate transactions. These rewards subsidize the cost of network participation.
Every Network has a specific way it calculates Rewards that can include Network state and Validator performance.
The Validator charges the Delegators who choose to stake their tokens to the protocol via the validator infrastructure. This fee is charged as a % of any rewards distributed by the protocol to that validator.
Commission fees help to cover operating costs of running the machine(s) and the network bandwidth that is required to effectively operate the Validator in accordance with the Network’s requirements.
Validators set the commission fee %, but are only able to change it in accordance with limitations set by the Network. The Commission Fee is public information published on the Network, accessible by any participants including Delegators.
The tokens that are staked to the network are usually locked up (“bonded”) for a specified period of time. The length of time differs from protocol to protocol and is entirely controlled by the protocol.
During this period, the protocol has temporarily removed the ability for the delegator to remove tokens from the address that is being used to stake and the tokens must remain in the address that is on the blockchain ledger.
Once the time period has elapsed, the tokens can be transferred back to the origin address (“unbonded”). Subject to any bonding period that is set by the protocol, the delegator has full control of the movement of tokens.
A delegator also has the ability to undelegate/unbond from a specific validator, and re-delegate to another validator without requiring permission from either the validator operator or the protocol.
To guarantee the integrity of the network, the protocol imposes a penalty on any participant who violates the protocol’s rules. This is referred to as a slashing event. These rules usually relate to signing or double-signing blocks or extreme downtime.
Slashing is applied at the validator level and is implemented by taking a set percentage from staked tokens.