Node Orchestration
Northstake connects users to one or multiple node operators via the node orchestration feature, significantly decreasing the complexity of managing a multi-vendor setup.
When Node Operators other than Northstake run the underlying infrastructure, some security measures are taken to mitigate potential risks:
- Northstake does not generate validator keys, which remain under the sole control of the node operator. This measure provides a clear separation of duties and mitigates slashing risk.
- When a validator is created, Northstake fetches the pre-signed exit messages from the node operator and makes them available to the user. With pre-signed exit messages, users can exit validators without relying on any third party.
Together these measures mitigate slashing risks and prevent loss of funds. The next sections outline how validators are created and exited in more detail.
Updated 11 days ago