Security and Privacy
Infrastructure Resilience
Redundant fallback systems are in place to ensure validator continuity in the event of hardware failure.
Updates and maintenance are handled with precision to avoid downtime or slashing risk.
Real-time monitoring and alerting allow prompt response to unusual conditions.
Privacy and Transparency
Inky Node does not collect user data.
No additional telemetry beyond what is required for validator monitoring.
Public metrics are available through common explorer tools. Direct queries welcome.
Hosting Environment
- Redundant power supply and on-site backup generators
- Temperature and humidity control
- Fire detection and suppression systems
- Physical access control with logs and continuous surveillance
- 24/7 uptime monitoring at the physical and network layer
- Backup power tested under load conditions regularly
Key Handling
Cold storage is used for vote and identity keys.
Signing is performed offline to reduce exposure, and no private keys are ever stored on validator infrastructure. Key material is backed up securely and versioned, ensuring recoverability without compromising safety.