The keys themselves are no more involved than just like doing a self custody kind of setup with a ledger hardware wallet or a good plus. It's basically the same approach where it becomes a little bit more complex is that you have these validator keys that are on the machine that you have your validators on. Now, if that machine becomes compromised, so say someone hacks into it, they can't access your ETH because they don't have your private key and they don’t have your seed phrase. But what they can do, and Vitalik has spoken about this, they can do like a thing with them where they slash you, they get you slashed, right? They want to

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode