The validation server is hosted by Latitude in enterprise-grade infrastructure and operates with the highest security standards. This includes using SSH key authentication, protection against brute-force attacks, a firewall, and comprehensive monitoring. The monitoring system is hosted on a separate server.
The validator utilizes three keypairs: identity, vote, and authorized withdrawal. The identity keypair, essential for the validator’s operation, is stored on the server. The vote keypair is safeguarded using a standard encryption protocol (256-bit AES). The withdrawal authority keypair is securely stored on a hardware wallet.