{"id":18314,"date":"2026-03-15T12:04:00","date_gmt":"2026-03-15T12:04:00","guid":{"rendered":"https:\/\/cryptoted.net\/index.php\/2026\/03\/15\/validated-staking-on-eth2-4-keys-%f0%9f%94%91\/"},"modified":"2026-03-15T12:04:00","modified_gmt":"2026-03-15T12:04:00","slug":"validated-staking-on-eth2-4-keys-%f0%9f%94%91","status":"publish","type":"post","link":"https:\/\/cryptoted.net\/index.php\/2026\/03\/15\/validated-staking-on-eth2-4-keys-%f0%9f%94%91\/","title":{"rendered":"Validated, staking on eth2: #4 &#8211; Keys \ud83d\udd11"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/blog.ethereum.org\/images\/posts\/merkle-4k.png\" \/><\/p>\n<div id=\"\">\n<p class=\"chakra-text css-gi02ar\"><em class=\"chakra-text css-0\">Special thanks to Sacha Yves Saint-Leger &amp; Danny Ryan for their review.<\/em><\/p>\n<p class=\"chakra-text css-gi02ar\">At the core of every Proof of Stake system is a signature scheme. Signatures are used to verify the identity of each validator allowing their actions, both good and bad, to be attributed to them.<\/p>\n<p class=\"chakra-text css-gi02ar\">We can verify honesty by looking at a validator&#8217;s signed messages and we can prove malice by showing messages that violate the rules of consensus.<\/p>\n<p class=\"chakra-text css-gi02ar\">In fact, in eth2, the identity of a validator <em class=\"chakra-text css-0\">is<\/em> their public key. Specifically, each validator has two sets of keys: a signing key and a withdrawal key.<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"signing-keys\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"signing keys permalink\" href=\"#signing-keys\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>Signing keys<\/h2>\n<p class=\"chakra-text css-gi02ar\">A <em class=\"chakra-text css-0\">signing key<\/em> is the key a validator needs to sign attestations and propose blocks. Because a validator needs to sign a message at least once per epoch, the client software must have custody of the key.<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"withdrawal-keys\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"withdrawal keys permalink\" href=\"#withdrawal-keys\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>Withdrawal keys<\/h2>\n<p class=\"chakra-text css-gi02ar\">Because the client software is always connected to the internet, there is of course a chance that one\u2019s signing key is compromised. To reduce the impact of such a breach, the actions a validator can perform are split between two keys.<\/p>\n<p class=\"chakra-text css-gi02ar\">The signing key, as explained above, is used for the validator to perform their duties. On the other hand, the <em class=\"chakra-text css-0\">withdrawal key<\/em> has the power to control a validator&#8217;s funds (transferring*, and withdrawing* ETH).<\/p>\n<p class=\"chakra-text css-gi02ar\">A validator should only need to use their withdrawal keys a few times over the lifetime of being a validator. This means they can be put into cold storage and stored with a high degree of security (offline).<\/p>\n<p class=\"chakra-text css-gi02ar\">* Transfers and withdrawals are not enabled until at least phase 1<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"thats-a-lot-of-keys\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"thats a lot of keys permalink\" href=\"#thats-a-lot-of-keys\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>That&#8217;s a lot of keys!<\/h2>\n<p class=\"chakra-text css-gi02ar\">If for every 32ETH staked, one needed to save and use 2 unrelated keys to make a deposit, this would get out of hand very quickly.<\/p>\n<p class=\"chakra-text css-gi02ar\">Luckily, we have a solution. The remedy is to have the keys use a common secret, so that storing a single secret gives access to multiple keys.<\/p>\n<p class=\"chakra-text css-gi02ar\">In eth2, this is achieved via EIPs <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/eips.ethereum.org\/EIPS\/eip-2333\">2333<\/a> and <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/eips.ethereum.org\/EIPS\/eip-2334\">2334<\/a>: a set of standards that describe how withdrawal and signing keys are related, and how they can be derived from a single mnemonic.<\/p>\n<h3 class=\"chakra-heading group css-xuzltg\" id=\"mnemonics\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"mnemonics permalink\" href=\"#mnemonics\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>Mnemonics<\/h3>\n<p class=\"chakra-text css-gi02ar\">Mnemonics are another way of encoding secrets and are a much simpler means for people to store and back up their private keys.<\/p>\n<p class=\"chakra-text css-gi02ar\">The idea being that it is simpler to remember or write down <span class=\"chakra-text css-ons8vw\">sausage solution loud isolate focus glide frame door clown million shuffle impulse<\/span> than <span class=\"chakra-text css-ons8vw\">0x1e9f2afcc0737f4502e8d4238e4fe82d45077b2a549902b61d65367acecbccba<\/span> without making any mistakes.<\/p>\n<h3 class=\"chakra-heading group css-xuzltg\" id=\"deriving-keys-from-other-keys\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"deriving keys from other keys permalink\" href=\"#deriving-keys-from-other-keys\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>Deriving keys from other keys<\/h3>\n<p class=\"chakra-text css-gi02ar\">When interacting with wallets, you may have encountered &#8220;paths&#8221; of the form <span class=\"chakra-text css-ons8vw\">m\/44&#8217;\/60&#8217;\/0&#8217;\/0\/0<\/span>. These paths describe a relationship between keys.<\/p>\n<p class=\"chakra-text css-gi02ar\">According to <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/eips.ethereum.org\/EIPS\/eip-2333\">EIP 2333<\/a>, this relationship takes the form of a tree structure in which a key is determined by a source of entropy (the tree\u2019s seed) and a tree path.<\/p>\n<p class=\"chakra-text css-gi02ar\">We use the seed to calculate the root of the tree and then build the tree in layers on top of this root. This tree of keys is defined purely through the relationship between the branch followed in the tree, and the tree&#8217;s root.<\/p>\n<p class=\"chakra-text css-gi02ar\">In practical terms, it allows us to find any key in the tree by starting at the root, and calculating the intermediate key at each branch we follow, until we reach the leaf we are interested in.<\/p>\n<p class=\"chakra-text css-gi02ar\">A wonderful consequence of this is that we can start with a single source of entropy (a mnemonic, for example), and from there build out a practically unlimited number of keys.<\/p>\n<p class=\"chakra-text css-gi02ar\">In addition, by securely storing just the mnemonic, you have a backup of every key that your validator uses.<\/p>\n<p class=\"chakra-text css-gi02ar\">This idea is used in eth2 to allow a single mnemonic to generate as many keys as a validator needs. For example, if you wanted to run 3 validators, you could use a single mnemonic to generate the withdrawal keys located at<br \/>\n<span class=\"chakra-text css-ons8vw\">m\/0<\/span>,<br \/>\n<span class=\"chakra-text css-ons8vw\">m\/1<\/span>,<br \/>\n<span class=\"chakra-text css-ons8vw\">m\/2<\/span>.<\/p>\n<div class=\"chakra-stack css-1jx0in4\">\n<pre><pre style=\"color:white;font-family:Consolas, Monaco, &quot;Andale Mono&quot;, &quot;Ubuntu Mono&quot;, monospace;text-align:left;white-space:pre;word-spacing:normal;word-break:normal;word-wrap:normal;line-height:1.5;font-size:1em;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-hyphens:none;-moz-hyphens:none;-ms-hyphens:none;hyphens:none;padding:1em;margin:0.5em 0;overflow:auto;background:#011627\"><code class=\"language-text\" style=\"color:#d6deeb;font-family:Consolas, Monaco, &quot;Andale Mono&quot;, &quot;Ubuntu Mono&quot;, monospace;text-align:left;white-space:pre;word-spacing:normal;word-break:normal;word-wrap:normal;line-height:1.5;font-size:1em;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-hyphens:none;-moz-hyphens:none;-ms-hyphens:none;hyphens:none\"><span>      [m \/ 0]\n<\/span>     \/\n<!-- -->    \/\n<!-- -->[m] - [m \/ 1]\n<!-- -->    \\\n<!-- -->     \\\n<!-- -->      [m \/ 2]\n<\/code><\/pre>\n<\/div>\n<p class=\"chakra-text css-gi02ar\">Each branch is separated by a <span class=\"chakra-text css-ons8vw\">\/<\/span> so <span class=\"chakra-text css-ons8vw\">m\/2<\/span> means start with the master key and follow branch 2.<\/p>\n<p class=\"chakra-text css-gi02ar\"><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/eips.ethereum.org\/EIPS\/eip-2334\">EIP 2334<\/a> states that the validator&#8217;s signing key is the <span class=\"chakra-text css-ons8vw\">0<\/span>th child-branch of the withdrawal key. In practice this means that, when the standard is followed, if you know the private key for withdrawal, you can calculate the corresponding private key for signing.<\/p>\n<p class=\"chakra-text css-gi02ar\">Continuing with the above example, the signing keys would be found at:<br \/>\n<span class=\"chakra-text css-ons8vw\">m\/0\/0<\/span>,<br \/>\n<span class=\"chakra-text css-ons8vw\">m\/1\/0<\/span>,<br \/>\n<span class=\"chakra-text css-ons8vw\">m\/2\/0<\/span>.<\/p>\n<div class=\"chakra-stack css-1jx0in4\">\n<pre><pre style=\"color:white;font-family:Consolas, Monaco, &quot;Andale Mono&quot;, &quot;Ubuntu Mono&quot;, monospace;text-align:left;white-space:pre;word-spacing:normal;word-break:normal;word-wrap:normal;line-height:1.5;font-size:1em;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-hyphens:none;-moz-hyphens:none;-ms-hyphens:none;hyphens:none;padding:1em;margin:0.5em 0;overflow:auto;background:#011627\"><code class=\"language-text\" style=\"color:#d6deeb;font-family:Consolas, Monaco, &quot;Andale Mono&quot;, &quot;Ubuntu Mono&quot;, monospace;text-align:left;white-space:pre;word-spacing:normal;word-break:normal;word-wrap:normal;line-height:1.5;font-size:1em;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-hyphens:none;-moz-hyphens:none;-ms-hyphens:none;hyphens:none\"><span>      [m \/ 0] - [m \/ 0 \/ 0]\n<\/span>     \/\n<!-- -->    \/\n<!-- -->[m] - [m \/ 1] - [m \/ 1 \/ 0]\n<!-- -->    \\\n<!-- -->     \\\n<!-- -->      [m \/ 2] - [m \/ 2 \/ 0]\n<\/code><\/pre>\n<\/div>\n<p class=\"chakra-text css-gi02ar\">While we tried to keep this example as simple as possible, in practice the paths involved are a little longer (<a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/eips.ethereum.org\/EIPS\/eip-2334\">EIP 2334<\/a> requires using <span class=\"chakra-text css-ons8vw\">m\/12381\/3600\/i\/0<\/span>, and <span class=\"chakra-text css-ons8vw\">m\/12381\/3600\/i\/0\/0<\/span> for withdrawal and signing keys respectively). Nevertheless, the logic remains the same.<\/p>\n<p class=\"chakra-text css-gi02ar\">The important thing to remember is that if you know the mnemonic, you can calculate your withdrawal keys, and from there derive your signing keys.<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"storing-keys\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"storing keys permalink\" href=\"#storing-keys\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>Storing keys<\/h2>\n<p class=\"chakra-text css-gi02ar\">Validator clients use keystores as a method for exchanging keys.<\/p>\n<p class=\"chakra-text css-gi02ar\"><em class=\"chakra-text css-0\">Keystores<\/em> are files that contain private keys encrypted with a user&#8217;s password. They can be safely stored and transferred between computers provided the password is not stored on the same computer.<\/p>\n<p class=\"chakra-text css-gi02ar\">When you are ready to start validating, you can give your client the keystores and the password encrypting them (it needs both pieces of information to import your keys).<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"becoming-a-validator\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"becoming a validator permalink\" href=\"#becoming-a-validator\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>Becoming a validator<\/h2>\n<p class=\"chakra-text css-gi02ar\">The first step in becoming a validator is to generate the appropriate keys. These will be generated once you&#8217;ve written down your mnemonic.<\/p>\n<p class=\"chakra-text css-gi02ar\">Since there are no withdrawals or transfers in phase 0, you do not need to have keystores for your withdrawal keys; storing your mnemonic safely is sufficient.<\/p>\n<p class=\"chakra-text css-gi02ar\">As your validator clients need your signing keys, you will receive a keystore for each of your validators to store these keys.<\/p>\n<p class=\"chakra-text css-gi02ar\">Now it&#8217;s deposit time! To become a validator, you will need to send 32 ETH per validator in addition to your <em class=\"chakra-text css-0\">deposit data<\/em> containing all of your validator public keys.<\/p>\n<p class=\"chakra-text css-gi02ar\">The deposit data are then recorded in the deposit contract on eth1. This contract is watched by eth2 nodes who are responsible for copying over the deposit data. Once your deposit data has been copied over, you are now officially a validator!<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"becoming-a-validator-the-easy-way\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"becoming a validator the easy way permalink\" href=\"#becoming-a-validator-the-easy-way\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>Becoming a validator the easy way<\/h2>\n<p class=\"chakra-text css-gi02ar\">We&#8217;re happy to announce that we&#8217;ve been working hard on a friendly interface to walk validators through this process. Stay posted for an update shortly on what the Eth2 Launchpad is and how to use it!<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/blog.ethereum.org\/en\/2020\/05\/21\/keys\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Special thanks to Sacha Yves Saint-Leger &amp; Danny Ryan for their review. At the core of every Proof of Stake system is a signature scheme. Signatures are used to verify the identity of each validator allowing their actions, both good and bad, to be attributed to them. We can verify honesty by looking at a [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":18273,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[24],"tags":[],"kronos_expire_date":[],"class_list":["post-18314","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethereum"],"_links":{"self":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/18314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/comments?post=18314"}],"version-history":[{"count":0,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/18314\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/media\/18273"}],"wp:attachment":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/media?parent=18314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/categories?post=18314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/tags?post=18314"},{"taxonomy":"kronos_expire_date","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/kronos_expire_date?post=18314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}