Learn more about
Ethereum Staking &
SafeStake
What is Ethereum Staking?
Understanding Ethereum Staking and Validators
Ethereum staking lets participants lock up or put their Ethereum (ETH) “at stake” to run a validator that helps secure the network in return for rewards. Staking is crucial for Ethereum’s security and sustainability.
Solo stakers must have at least 32 ETH and sufficient computer hardware with a constant internet connection (or vps) to run a node. For smaller amounts, staking services and liquid staking pools (coming to SafeStake in Stage 2) offer an alternative.
Validators performing duties correctly and on time earn rewards. When a validator goes offline, ETH is deducted from its balance for each epoch it remains inactive. Validators that act maliciously will be slashed and lose their entire balance of staked ETH. The blockchain is ultra-secure because compromising it would require a “51% attack” costing 51% of the value of all staked ETH, or many billions of dollars.
What is SafeStake?
SafeStake is a cutting-edge platform & protocol designed to enhance Ethereum staking by providing secure, efficient, and scalable solutions. It leverages Distributed Validator Technology (DVT) to decentralize and optimize validator operations.
SafeStake ensures the highest level of security by using advanced encryption and distributed validators. This means your assets are protected and private keys stay private.
SafeStake supports solo, retail, and institutional stakers and large-scale liquid staking operations. The fault-tolerant architecture ensures validators stay online, maximizing staking rewards and allowing professional operators to manage numerous validators with outstanding performance and ease.
SafeStake decentralizes staking operations across multiple nodes, enhancing security and operational efficiency. This resilient approach reduces downtime, providing a more enjoyable and profitable staking experience.
How does SafeStake work?
In Ethereum’s native single-node construct, a validator’s private key signs data for the Beacon Chain. SafeStake splits this key into multiple “key shares” and distributes them across several nodes. This innovative approach enhances validator security and uptime, minimizes risks, and maximizes staking rewards.
The key shares work together via consensus to attest for the validator through an operator committee. This committee coordinates the shares, allowing them to perform the necessary functions without the actual private key being online.
With SafeStake, only 3 out of 4 nodes in the committee need to be online for the validator to attest, ensuring > 99% effectiveness over time. This high availability ensures validators and staking operations run smoothly and continuously, maximizing rewards and maintaining blockchain integrity.
SafeStake’s private key management and robust architecture make it an excellent solution for secure, reliable, and profitable Ethereum staking.
SafeStake network participants
Validators
Stage 1 — Users stake 32 ETH and create a validator on the Beacon Chain, then import it to SafeStake using the secure drag-n-drop interface.
Stage 2 — Initiator operators stake 4 ETH and retail users stake a minimum of 0.1 ETH to participate in running a pooled validator
Validators select multiple operators during import, known as the “operator committee,” to attest and propose blocks on their behalf.
Operators
Operators maintain independent, trustless nodes and hold the key shares that operate distributed validators.
Operators are able join and leave the SafeStake permissionless network at will.
Validators pay operators a fee in DVT tokens ($DVT) for their services.
SafeStake DAO
The SafeStake DAO built and maintains the protocol, and is responsible for governing the SafeStake network.
Users must own $DVT to vote on governance proposals that affect the SafeStake protocol. The amount of $DVT a user owns equates directly to their voting power.
Distribute your Ethereum Validator
Quick start
Validator Resources
step-by-step tutorial
Run a Node / Earn $DVT
Quick start
Validator Resources
step-by-step tutorial
Subscribe to our Newsletter