To the Main Page

Security and Privacy

Infrastructure Resilience

Redundant fallback systems are in place to ensure validator continuity in the event of hardware failure.
Updates and maintenance are handled with precision to avoid downtime or slashing risk.
Real-time monitoring and alerting allow prompt response to unusual conditions.

Privacy and Transparency

Inky Node does not collect user data.
No additional telemetry beyond what is required for validator monitoring.
Public metrics are available through common explorer tools. Direct queries welcome.

Hosting Environment

Key Handling

Cold storage is used for vote and identity keys.
Signing is performed offline to reduce exposure, and no private keys are ever stored on validator infrastructure. Key material is backed up securely and versioned, ensuring recoverability without compromising safety.