What is a Distributed Validator?

Distributed Validators (DVs) enable multiple nodes or parties to run validators together.

obol'S DV Implementation

✔️

Byzantine & crash fault tolerant

✔️

Key shares reduce slashing risk

✔️

No private keys put on chain

✔️

No non-ETH token risk

Learn more

The problem with validators today

Traditional validators are fragile

Most validators today run on a single machine, using a single private key. If that machine goes down, that validator goes down. Worse still, if that private key is compromised, that validator is compromised.


Each validator is a single-point-of-failure for the Ethereum network.

the new standard for validators

DVs enable multi-node operation

A distributed validator cluster consists of multiple nodes (ideally 4, 7, or 10). Each node within a cluster has a partial validator key share that is generated in a distributed key generation ceremony (DKG). The nodes within a DV cluster operate together as a single logical validator through the inclusion of a DV middleware client, Charon.


Distributed validators enable fault tolerance for validators without introducing slashing risk.

How a DV works

Threshold signing enables secure & resilient operation

During operation, Charon coordinates what each validator signs by reconstituting the partial signatures into an aggregate signature for the distributed validator. As long as >66% of the nodes within a cluster are online, the validator stays online.


Distributed validators improve security by ensuring that at no time is the full validator private key present in a single place.

The Capabilities of DVs

The Capabilities of DVs

High availability without slashing

Distributed validator clusters can continue operating normally even with up to one-third of the nodes offline or malfunctioning. This feature allows for high uptime without the slashing risks associated with running two or more copies of a traditional validator.

High Availability Without Slashing

Distributed validator clusters can continue operating normally even with up to one-third of the nodes offline or malfunctioning. This feature allows for high uptime without the slashing risks associated with running two or more copies of a traditional validator.

Private key distribution & security

Validator key shares are generated through a distributed key generation (DKG) ceremony, ensuring that the full key never exists. This greatly reduces the risk of validator key compromise since more than two-thirds of the key shares would need to be stolen to derive the full validator private key.

Private key distribution & security

Validator key shares are generated through a distributed key generation (DKG) ceremony, ensuring that the full key never exists. This greatly reduces the risk of validator key compromise since more than two-thirds of the key shares would need to be stolen to derive the full validator private key.

Byzantine fault tolerance

Multiple Charon clients come to consensus on validator duties and behave as a single unified proof-of-stake validator, achieving byzantine-fault tolerance given a supermajority of honest nodes.

Byzantine fault tolerance

Multiple Charon clients come to consensus on validator duties and behave as a single unified proof-of-stake validator, achieving byzantine-fault tolerance given a supermajority of honest nodes.

Client diversity

Each node within a DV cluster can run their own combination of execution, consensus, and validator clients, allowing client diversity to be built directly into a validator. This ensures a DV cluster will remain unaffected by issues with any one client.

Client diversity

Each node within a DV cluster can run their own combination of execution, consensus, and validator clients, allowing client diversity to be built directly into a validator. This ensures a DV cluster will remain unaffected by issues with any one client.

Obol's DV Node Client Stack

Obol's DV Node Client Stack

Execution client

The execution client runs the EVM and manages the transaction pool for the Ethereum network. These clients provide execution payloads to consensus clients for inclusion into blocks.

The execution client runs the EVM and manages the transaction pool for the Ethereum network. These clients provide execution payloads to consensus clients for inclusion into blocks.

Consensus client

The consensus client's duty is to run the Proof of Stake consensus layer of Ethereum, commonly referred to as the Beacon Chain.

The consensus client's duty is to run the Proof of Stake consensus layer of Ethereum, commonly referred to as the Beacon Chain.

DV middleware client

The DV client intercepts the standardised REST API communication between any consensus client and validator client pair, and coordinates with other Charon clients in the cluster to reach consensus on what to present the validator to sign, and then to aggregate the returned signature.

The DV client intercepts the standardised REST API communication between any consensus client and validator client pair, and coordinates with other Charon clients in the cluster to reach consensus on what to present the validator to sign, and then to aggregate the returned signature.

Validator client

The validator client functions as normal, using the validator key share to sign a message it has received from Charon, before passing it back to Charon for aggregation.

The validator client functions as normal, using the validator key share to sign a message it has received from Charon, before passing it back to Charon for aggregation.

Obol’s No-Compromises

DV Implementation

Byzantine & crash fault tolerant

Obol DVT

Other DVT

Byzantine & crash fault tolerant

✔️

✔️

Key shares reduce slashing risk

✔️

✔️

Non-custodial reward splits

✔️

?

No private keys put on chain

✔️

No non-ETH token risk

✔️

Swappable cluster participants

...

✔️

No reliance on a single p2p network

✔️

Expand table

Byzantine & crash fault tolerant

Obol DVT

Other DVT

Byzantine & crash fault tolerant

✔️

✔️

Key shares reduce slashing risk

✔️

✔️

Non-custodial reward splits

✔️

?

No private keys put on chain

✔️

No non-ETH token risk

✔️

Swappable cluster participants

...

✔️

No reliance on a single p2p network

✔️

Expand table

Byzantine & crash fault tolerant

✔️

✔️

Byzantine & crash fault tolerant

Obol DVT

Other DVT

Non-custodial reward splits

✔️

✔️

Key shares reduce slashing risk

✔️

✔️

Non-custodial reward splits

✔️

?

No private keys put on chain

✔️

No non-ETH token risk

✔️

Swappable cluster participants

...

✔️

No reliance on a single p2p network

✔️

Expand table

A Composable DV Middleware

We built our DV solution as a middleware, prioritising security, resilience, and composability. This is in support of our mission to strengthen and decentralise Ethereum.

Secure

Charon does not have access to validator keys, and the secure DKG ensures that the full private key never exists in one place.

Secure

Charon does not have access to validator keys, and the secure DKG ensures that the full private key never exists in one place.

Secure

Charon does not have access to validator keys, and the secure DKG ensures that the full private key never exists in one place.

Resilient

A cluster’s nodes can run a diverse set of clients. Nodes communicate directly with one another, and each cluster of nodes is separate from each other.

Resilient

A cluster’s nodes can run a diverse set of clients. Nodes communicate directly with one another, and each cluster of nodes is separate from each other.

Resilient

A cluster’s nodes can run a diverse set of clients. Nodes communicate directly with one another, and each cluster of nodes is separate from each other.

Composable

Our DV middleware fits seamlessly into the existing client stack, allowing staking products to make their own design choices.

Composable

Our DV middleware fits seamlessly into the existing client stack, allowing staking products to make their own design choices.

Composable

Our DV middleware fits seamlessly into the existing client stack, allowing staking products to make their own design choices.

Performant

Direct P2P communication reduces latency and bandwidth use (vs. a public gossip network) and allows operation on a private network.

Performant

Direct P2P communication reduces latency and bandwidth use (vs. a public gossip network) and allows operation on a private network.

Performant

Direct P2P communication reduces latency and bandwidth use (vs. a public gossip network) and allows operation on a private network.

High Availability Without Slashing

Distributed Validator Clusters can continue operating normally even with up to 1/3rd of the nodes offline or malfunctioning. This feature allows for high uptime without the slashing risks associated with running two or more copies of a traditional validator.

Private Key Distribution & Security

Validator key shares are generated through a Distributed Key Generation (DKG) ceremony, ensuring that the full key never exists. This greatly reduces the risk of validator key compromise since more than two-thirds of the key shares would need to be stolen to derive the full validator private key.

Byzantine Fault Tolerance

Multiple Charon clients come to consensus on validator duties and behave as a single unified proof-of-stake validator, achieving byzantine-fault tolerance given a supermajority of honest nodes.

Client Diversity

Each node within a DV cluster can run their own combination of EL, CL, and validator clients, allowing client diversity to be built directly into a validator, ensuring it will remain unaffected by issues with any one client.

The capabilities of DV

Get Started

Enter Obol’s decentralised validator ecosystem.
Begin your journey: stake on DVs via these staking products.

Staking Protocols

Staking Protocols

Staking Protocols

Node Operators

Node Operators

Node Operators

Token Holders

Token Holders

Token Holders

Home Stakers

Home Stakers

Home Stakers

The problem with validators today

Traditional validators are fragile

Most validators today run on a single machine, using a single private key. If that machine goes down, that validator goes down. Worse still, if that private key is compromised, that validator is compromised.


Each validator is a single-point-of-failure for the Ethereum network.

The problem with validators today

Traditional validators are fragile

Most validators today run on a single machine, using a single private key. If that machine goes down, that validator goes down. Worse still, if that private key is compromised, that validator is compromised.


Each validator is a single-point-of-failure for the Ethereum network.

the new standard for validators

DVs enable multi-node operation

A distributed validator cluster consists of multiple nodes (ideally 4, 7, or 10). Each node within a cluster has a partial validator key share that is generated in a distributed key generation ceremony (DKG). The nodes within a DV cluster operate together as a single logical validator through the inclusion of a DV middleware client, Charon.


Distributed validators enable fault tolerance for validators without introducing slashing risk.

the new standard for validators

DVs enable multi-node operation

A distributed validator cluster consists of multiple nodes (ideally 4, 7, or 10). Each node within a cluster has a partial validator key share that is generated in a distributed key generation ceremony (DKG). The nodes within a DV cluster operate together as a single logical validator through the inclusion of a DV middleware client, Charon.


Distributed validators enable fault tolerance for validators without introducing slashing risk.

How a DV works

Threshold signing enables secure & resilient operation

During operation, Charon coordinates what each validator signs by reconstituting the partial signatures into an aggregate signature for the distributed validator. As long as >66% of the nodes within a cluster are online, the validator stays online.


Distributed validators improve security by ensuring that at no time is the full validator private key present in a single place.

How a DV works

Threshold signing enables secure & resilient operation

During operation, Charon coordinates what each validator signs by reconstituting the partial signatures into an aggregate signature for the distributed validator. As long as >66% of the nodes within a cluster are online, the validator stays online.


Distributed validators improve security by ensuring that at no time is the full validator private key present in a single place.