The keys themselves are no more involved than just like doing a self custody kind of setup with a ledger hardware wallet or a good plus. It's basically the same approach where it becomes a little bit more complex is that you have these validator keys that are on the machine that you have your validators on. Now, if that machine becomes compromised, so say someone hacks into it, they can't access your ETH because they don't have your private key and they don’t have your seed phrase. But what they can do, and Vitalik has spoken about this, they can do like a thing with them where they slash you, they get you slashed, right? They want to