As one of the leading staking providers in the market, we frequently receive feedback from our clients about the need for a more comprehensive staking portfolio dashboard. They expressed the necessity for a tool that effectively tracks and monitors their staking metrics. That’s why we are excited to announce the launch of the Ethereum Staking Dashboard, a tool crafted to enhance how you track and analyse your Ethereum staking.
This innovative dashboard is designed to provide users with a detailed view of crucial staking metrics for the entire portfolio, demonstrating P2P’s commitment to advancing blockchain technology through strategic innovation.
Our team has worked hard to create a product that not only offers an exceptional user experience but also provides a broad set of features tailored for Ethereum stakers.
Uncover the benefits that make our dashboard exceptional:
Ethereum Staking Dashboard: Open Insights for All
Ethereum Staking Portfolio Dashboard is open to all, providing comprehensive staking insights in a user-friendly manner.
Try it yourself: https://app.p2p.org/dashboard
The Future of Staking Analytics: Expanding Horizons
We're committed to expanding our platform to include data from a diverse range of cutting-edge blockchain networks, ensuring that our users have access to the most comprehensive and up-to-date staking insights. In the coming months, keep an eye out for the integration of data from EigenLayer, Solana, Polkadot, and Cosmos Hub.
Unleash the Potential of Staking Data with Staking Data API
Ready to take your staking applications and research to the next level? With our Staking Data API, you can fetch all of the staking data from a wide range of leading networks, including Ethereum, Polkadot, Solana, Cosmos Hub, Polygon, Sui, Kusama, Vara, and Moonbeam.
Visit our Staking Data API to explore the endless possibilities and unlock the full potential of staking data.
<p>Restaking in presents unique opportunities and challenges. <strong>This article explores the risks involved in restaking, such as smart contract vulnerabilities, operator issues, and protocol flaws, and offers practical strategies to mitigate these risks. </strong>Whether you're an experienced investor or a newcomer, this guide provides essential insights for secure and profitable restaking. Equip yourself with the knowledge needed to navigate this complex landscape confidently.</p><h3 id="contents">Contents</h3><ul><li>Intro</li><li>Map of risks<ul><li>EL smart contract risks</li><li>Operator risks</li><li>Protocol risks</li><li>Operational risks</li></ul></li><li>Risk mitigation</li></ul><h2 id="intro">Intro</h2><p>In April, <a href="https://www.eigenlayer.xyz/?ref=p2p.org">EigenLayer</a> restaking entered Stage 3 on the mainnet with an assortment of Actively Validated Services (AVS) becoming live and ready to be delegated. This marked the beginning of active restaking portfolio construction & management and refreshed the importance of restaking risk evaluation.<br><br>We at <a href="http://p2p.org/?ref=p2p.org">P2P.org</a> take risk considerations carefully and are delighted to share our thoughts. This blog post aims to inform restakers of risks and risk mitigation measures. We will outline:</p><ul><li>the importance of building a risk framework</li><li>risks that may exist in restaking</li><li>risk mitigation strategies and why Operator choice is essential</li><li>challenges in risk evaluation<br></li></ul><blockquote><em>We exclude LRTs and risks specific to liquid restaking. However, a reader can use the provided information to explore the risks of underlying LRT restaking portfolios.</em></blockquote><p>We assume that a reader has an essential awareness of Ethereum, delegated proof of stake (DPoS) staking, and Eigenlayer restaking. For those who are not sure about that, we recommend checking out these resources:</p><ul><li><a href="https://ethereum.org/en/what-is-ethereum/?ref=p2p.org">What is Ethereum</a></li><li><a href="https://www.ledger.com/academy/what-is-delegated-proof-of-stake-dpos?ref=p2p.org">What is Delegated PoS</a></li><li><a href="https://docs.eigenlayer.xyz/eigenlayer/overview/?ref=p2p.org">Intro to Eigenlayer</a></li><li><a href="https://www.blog.eigenlayer.xyz/ycie/?ref=p2p.org">You Could’ve Invented Eigenlayer</a><br></li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://p2p.org/economy/content/images/2024/05/image-7.png" class="kg-image" alt loading="lazy" width="1602" height="1120" srcset="https://p2p.org/economy/content/images/size/w600/2024/05/image-7.png 600w, https://p2p.org/economy/content/images/size/w1000/2024/05/image-7.png 1000w, https://p2p.org/economy/content/images/size/w1600/2024/05/image-7.png 1600w, https://p2p.org/economy/content/images/2024/05/image-7.png 1602w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">*</span><i><em class="italic" style="white-space: pre-wrap;">Mostly for illustrative purposes.</em></i></figcaption></figure><h3 id="background">Background</h3><p>In classic DPoS (<em>Delegated Proof of Stake</em>), a token holder who wants to stake chooses a staking service provider (SSP) who will operate nodes and perform protocol duties on the staker's behalf for some fee. This form of staker-SSP relationship is called a delegation. Delegations provide economic security to the protocol, require locking the funds, and are incentivized by reward earnings. A delegator is supposed to do their research on validators and decide who is the best in terms of yield & credibility.</p><p>Conceptually, the restaking process is similar to mere staking but introduces an additional layer of complexity. In addition to choosing an Operator, a delegator must now consider a set of protocols (AVSs).</p><p>We assume a case when a delegator has already settled with Ethereum - they run nodes themselves or stake via Ethereum staking service provider (SSP) or liquid staking protocol (LSP) and has yet to opt in restaking offered by Eigenlayer.</p><p>In Eigenlayer, a delegator (also referred to as a restaker) must choose a Strategy. The Strategy comprises an Operator and the set of AVSs supported by this Operator.</p><p>Operators are obliged to perform duties prescribed by AVS protocols. If they don't, they might be penalized, and the penalty is usually either slashing (burning a fraction of a stake) or jailing (de-registering, banning from operations).</p><div class="kg-card kg-callout-card kg-callout-card-grey"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">A list of some slashing & jailing conditions that AVSs can have:<br><br>- Misattestation of block/data<br>- Doublesigning<br>- Operational<br>- Downtime<br>- Laziness (imitation of proper work)<br>- Wrong computation output</div></div><p><br>Slashing events may occur due to Operator misbehavior, failure, or protocol flaws, which are sometimes induced by specific market conditions (e.g., high load due to market volatility) and massive technical collapses. Even though slashing is not currently enabled in Eigenlayer, it eventually will be, and it's about the right time to start thinking about it if you didn't before.</p><p>Since a restaking choice is narrowed down to choosing a single Operator (per the same capital), the choice of the Operator is critical, as in case of severe operator-related issues, there is a chance of being penalized on all AVS simultaneously—risks become correlated to some extent. The infrastructure automation, monitoring, and support of AVSs will likely be handled by dedicated DevOps engineers, who may share a common architecture and resources.</p><p>For example, the whole cluster of different AVS nodes may go down because they were hosted on the same cloud provider, which went offline in disaster cases.</p><p><strong>Besides slashing risks, one could also think of Eigenlayer smart contract risks and operational risks.</strong></p><p>All these risks can be loosely classified by fundamental sources:</p><ul><li>Eigenlayer Smart contract risk</li><li>Strategy risk<ul><li>Operator (validator) risk</li><li>Protocol (AVS) risk</li><li>Operational (delegators operations) risk</li></ul></li></ul><p>Let’s look into these categories in the next section.</p><h1 id="map-of-risks"><br>Map of risks</h1><p></p><h2 id="eigenlayer-smart-contract-risks">EigenLayer Smart Contract risks</h2><p>EigenLayer consists of a complex set of smart contracts. Here are the most important ones:</p><ul><li><strong>EigenPod</strong> - verifies ETH Beacon deposits via Beacon chain oracle</li><li><strong>EigenPodManager</strong> - deploys pods, keeps track of pod shares (podOwnerShares)</li><li><strong>DelegationManager</strong> - registers operators</li><li><strong>StrategyManager</strong> - the primary entry- and exit point for funds into and out of EigenLayer</li><li><strong>Slasher</strong> - is attached to StrategyManager but does nothing at the moment</li></ul><p>Although we won't delve into their details in this chapter (how they function is well described in this <a href="https://www.blog.eigenlayer.xyz/ycie/?ref=p2p.org" rel="noreferrer">article</a>), it still merits mentioning mechanics related to slashing and draining risks.</p><p>EigenLayer restakes <strong>shares</strong>, not the underlying assets (ETH, LSTs) directly. Shares only exist in EigenLayer contracts for accounting and are subject to slashing. They are not tokens and are not transferrable. That highlights the possible foundation for developing slashing cancelation mechanisms. In the previous version of Eigenlayer, the slashing of real assets could happen via asset locks during the withdrawal process.</p><p>The most significant risk in EigenLayer in the existing version (and potentially in the following versions) is the <a href="https://docs.eigenlayer.xyz/eigenlayer/security/multisig-governance?ref=p2p.org" rel="noreferrer">upgrade governance</a>. Nine out of 13 community EOAs (P2P.org is one of the signers) can ruin the system if they coordinate or get hacked. Any malware code can be pushed to the mainnet smart contracts and drain the funds through them.</p><p>We will continue tracking the development and determine if additional jeopardizing features appear with new version releases.</p><h2 id="operators-risks">Operators risks</h2><figure class="kg-card kg-image-card"><img src="https://p2p.org/economy/content/images/2024/05/image-9.png" class="kg-image" alt loading="lazy" width="2000" height="885" srcset="https://p2p.org/economy/content/images/size/w600/2024/05/image-9.png 600w, https://p2p.org/economy/content/images/size/w1000/2024/05/image-9.png 1000w, https://p2p.org/economy/content/images/size/w1600/2024/05/image-9.png 1600w, https://p2p.org/economy/content/images/2024/05/image-9.png 2000w" sizes="(min-width: 720px) 720px"></figure><h3 id="hardware">Hardware</h3><p>Under hardware, we understand the physical properties of infrastructure—location, CPU, bandwidth, power stability, etc. Operators can use various cloud providers and configure nodes that don't fully meet the requirements or face capacity problems over time. It won’t be clear until the protocol issues a penalty, and then it might be too late for a delegator as they lose funds.</p><p>Hardware issues usually lead to higher downtime risks (meaning losing rewards), but sometimes also to slashing.</p><blockquote>As an abstract example, bad connectivity may lead to delays in the perceived state of the network; therefore, a node will attest to wrong data that does not fit the consensus.</blockquote><h3 id="software">Software</h3><p>Software may include nodes’ clients, various plugins, and automatization and management solutions deployed by an Operator. Software problems can come from AVS developers and an Operator; sometimes, the node client might come from external developers, and an Operator may choose to use it. Bad, unaudited code and the absence of timely client updates may cause unexpected operational behavior and lead to downtime and slashing.</p><h3 id="hardware-software-setup">Hardware + Software = Setup</h3><p>Technical issues related to hardware and software are not perfectly independent. Problems with one may reveal issues with another.</p><blockquote>Consider an Operator who runs two nodes. The second one is a backup node in case the first one goes down. It is managed automatically. Imagine if the system wrongly decides that there’s a need to turn on the secondary node while the main one operates, maybe because of losing the connection to the primary node or for other reasons. This will then lead to double signing and, hence, slashing.</blockquote><p>In this example, a minor hardware (connectivity) problem highlighted suboptimal software configuration, which resulted in a catastrophe. Thus, it is also reasonable to evaluate hardware and software as a whole system from the design perspective.</p><h3 id="security-breaches">Security breaches</h3><p>Poor security procedures, such as weak passwords, access management, and key management, put node operations at risk. This won’t necessarily lead to the total loss of the delegation funds unless the delegation is made in a custodial way. Still, it may expose a protocol to dishonesty/griefing attack vectors, resulting in slashing.</p><h3 id="bad-actors-dishonesty">Bad actors & dishonesty</h3><p>Generally, dishonesty is driven by two major factors: profit extraction and griefing. Dishonesty is intentional. For this to happen, there should be a condition satisfied: </p><blockquote><em>Value from the attack > Cost of the attack</em></blockquote><p>The cost of the attack can be decomposed into a) financial cost and b) reputation cost.</p><p>Reputation cost is hard to denote in exact numbers but easy to grasp. If an Operator is caught doing dishonest actions, eventually, they will lose credibility and, consequently, delegations and future earnings. AVS operations do not limit the reputation damage and will spread across all Operator businesses. One can roughly say that reputation cost is the net present value of all future profits that an Operator can earn. The higher the TVL (as a proxy of profit), the higher the chance that the Operator will be honest. It merits mentioning that it is not essential that Operators are the only participants in the attack. They can be just members of the attack group and, in the end, bribed (or even hacked) by another party.</p><p>Financial costs will vary across AVSs depending on the protocol design. An abstract example would be network congestion or spamming to disable other Operators to take over a protocol for a short period. This may include fees, infrastructure, bribes to other Operators, etc. To determine the cost, one should inspect all possible attack vectors on AVSs, which is sometimes difficult.</p><p>The value from the attack will also depend on the AVS type and ecosystem around it — value locked, trading activity, etc.</p><h2 id="protocol-risks">Protocol risks</h2><figure class="kg-card kg-image-card"><img src="https://p2p.org/economy/content/images/2024/05/image-10.png" class="kg-image" alt loading="lazy" width="2000" height="885" srcset="https://p2p.org/economy/content/images/size/w600/2024/05/image-10.png 600w, https://p2p.org/economy/content/images/size/w1000/2024/05/image-10.png 1000w, https://p2p.org/economy/content/images/size/w1600/2024/05/image-10.png 1600w, https://p2p.org/economy/content/images/2024/05/image-10.png 2000w" sizes="(min-width: 720px) 720px"></figure><h3 id="protocol-logic">Protocol logic</h3><p>Protocol logic resembles the set of rules, policies, and processes that govern the operations and, in particular, ensure that Operators are properly incentivized to perform duties well. Rules include consensus, slashing conditions, reward schemes, etc. Improper protocol logic design may cause unintended violations of slashing conditions.</p><blockquote>Imagine an oracle that delivers an aggregated exchange rate for some asset pair. Let it be a median price. Oracles gather data from external providers like Coingecko or CMC, each has their own version of truth. <br><br>Let this oracle protocol pursue accuracy of the data, it should be gathered timely. So if some Operator posts the price that diverges from the resulting median too much, then they get slashed. For example, this might happen when an operator is lagging and delivers an “old price”, which is inaccurate, or the Operator might want to influence the result value to attack DeFi protocols. These are Operator side issues that should be disincentivized. <br><br>But what if there’s a problem with the external source? The Operator performs their duties well but gets slashed anyway because their truth source differs from others. This is exactly the case of bad protocol rules’ design. No bad intention, no bad performance, still slashed.</blockquote><p>The example above may generally be applied to occasions when slashing cannot be organized purely based on on-chain data. However, such slashing conditions can be potentially mediated through $EIGEN token staking. Learn more in <a href="https://p2p.org/economy/how-eigen-works/">our blog post</a>. </p><h3 id="software-vulnerabilities">Software vulnerabilities</h3><p>There is a chance of AVS having code flaws, which may then expose it to security vulnerabilities and operations breaks. The consequences can vary depending on the attack goal, making operators attest to malicious state transition (i.e., enabling double spending), Oracle price misreporting, etc.</p><h3 id="infrastructure-landscape">Infrastructure Landscape</h3><p>Even if everything is good with Operators and AVS, the infrastructure landscape itself can still present slashing risks. For instance, imagine something like the supermajority of Geth clients in Ethereum*. This particular case is a protocol-level risk, but it comes from the existing infrastructure landscape and sometimes can be managed by an Operator.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">❗</div><div class="kg-callout-text">*For a bigger picture, learn more about Ethereum supermajority risk here: <a href="https://supermajority.info/?ref=p2p.org">https://supermajority.info</a></div></div><h3 id="centralization-led-risks"><br>Centralization-led Risks</h3><p>Depending on the protocol design, sometimes large stake centralization poses risks for the whole network. If operators possessing large amounts of stake go offline or experience bugs, they can affect the whole network and cause mass slashing events. The probability of such a risk is higher when some Operator has a critical amount of delegations requiring just this Operator to fail to initiate the issue.</p><h3 id="staking-derivatives-contagion">Staking Derivatives Contagion</h3><p>LRTs appeared to be an important market player and have attracted large amounts of ETH since the launch of Eigenlayer. Some AVSs softly deal with them to ensure the initial amounts of security delivered. At the same time, the limit on LST restaking has been removed recently; therefore, an additional inflow of LST restaking can be expected.</p><p>Therefore, there can be situations when liquid restaking and staking protocols provide most of the AVS stake.</p><p>In normal market conditions, it doesn't pose any significant risk, but in the case of LRT and LST depegging, the security of AVS might evaporate, exposing it to attacks and instability.</p><h2 id="operational-risks">Operational Risks</h2><h3 id="reward-management-risks">Reward Management risks</h3><p>Security provisions are supposed to be rewarded, and restaking is no exception. There will be a large variety of AVSs; some may pay in the native tokens, some may pay out in tokens of integrated protocols (i.e., roll-ups), and tokens can even be issued in the non-Ethereum ecosystem (i.e., in Ethos). Once a restaker is rewarded, they must decide what to do with rewards - sell or stake again, if AVS accepts this token for staking, or swap to ETH and (re)stake ETH (or LST). Additional actions can be taken to accomplish that, such as reward withdrawal, bridging, swapping, etc. Apparently, restaking on multiple (imagine 10+ or even 20+) AVS will result in a resource-consuming reward management process.</p><p><strong>From a practical perspective, restakers can encounter the following:</strong></p><figure class="kg-card kg-image-card"><img src="https://p2p.org/economy/content/images/2024/05/image-11.png" class="kg-image" alt loading="lazy" width="1430" height="972" srcset="https://p2p.org/economy/content/images/size/w600/2024/05/image-11.png 600w, https://p2p.org/economy/content/images/size/w1000/2024/05/image-11.png 1000w, https://p2p.org/economy/content/images/2024/05/image-11.png 1430w" sizes="(min-width: 720px) 720px"></figure><p><br>In the most basic cases, rewards are paid in ETH and occur at predefined Ethereum addresses. There is no need to make any withdrawals or trade tokens. It's almost the same as Ethereum staking itself.</p><p>In a complicated dual staking case, rewards are paid in the AVS token on the external blockchain. AVS has a dual staking model, and rewards should be claimed. Then, they might be compounded or sold, bridged, and dispersed across different trading venues.</p><p>There can be so many actions and various data to track that <strong>the number of points of failure and reporting nuances is pretty high</strong>. Compared to mere ETH staking, restaking requires additional time and resources in rewards management; otherwise, stakers may <strong>miss rewards, not meet tax liabilities, and fail to realize the yield.</strong></p><p>Regarding reward management procedures, restakers should consider market conditions for reward tokens. In particular, it is important to track the available liquidity on trading venues and choose an optimal execution strategy to preserve yield.</p><h3 id="additional-unbonding-period">Additional unbonding period</h3><p>Eigenlayer restaking increases the duration of ETH withdrawals as there’s the time of undbonding from AVSs. Therefore, additional opportunity costs can arise due to the inability to move ETH.</p><blockquote>Currently, Eigenlayer unbonding period equals 7 days, but the period can change in the future.</blockquote><h3 id="legal-risks">Legal risks</h3><p>A delegator should check whether the AVS and owning the AVS token or even restaking itself doesn’t violate legislation of the country of their residence.</p><p></p><h1 id="risk-mitigation">Risk mitigation</h1><h3 id="protocol-risks-the-devil-is-not-so-terrible-as-he-is-painted"><br>Protocol risks: The devil is not so terrible as he is painted.</h3><p>Mass slashing events caused by improper protocol functioning theoretically do not harm a restaker. Eigenlayer has a special committee that is expected to revert the consequences. Also, the protocols are examined and audited for such possibilities during the onboarding procedures. Therefore, without regulatory complications, a protocol risk is expected to be minimized to reward handling.</p><p>Nevertheless, it’s better to be aware of all kinds of scenarios, even if they can be managed post-factum. The odds are small, but can something go wrong? Keep that in mind while constructing a portfolio and checking for risks we outlined previously.</p><h3 id="choose-a-credible-operator">Choose a credible Operator</h3><p>To minimize Operator risk (which seems to be the largest source of risks so far), delegating to Operators with a solid track record and large TVL, public recognition, or personal assurance is important. Before choosing between different Operators, <strong>it is worth building a checklist</strong> highlighting TVL in other networks, acknowledgment from Eigenlayer and AVSs’ foundations, availability of SOC certificates, and previous cases of dishonest & unprofessional behavior that led to the loss of funds.</p><h3 id="plan-in-advance-how-the-reward-monitoring-and-reporting-will-work">Plan in advance how the reward monitoring and reporting will work</h3><p>As we saw above, the variety of yield extraction paths is huge, so a delegator should carefully examine it and construct business/monitoring/reporting processes themselves or outsource it to a specialized third party. Doing it properly will help maximize yield and avoid unnecessary tax and legal pressure. Data services become crucial in this regard.</p><h3 id="role-of-data-services">Role of data services</h3><p>Besides helping operational functions, data services can be applied to operator and protocol risk evaluation. The qualitative approach determines the surface of possible slashing risks but cannot tell the probabilities of outcomes.</p><p>Practically, almost always, there will be no available data or method to predict slashing risks with verifiable accuracy. Most slashing events have an extremely low probability, making it almost impossible to figure out the exact exposure. Historically, there have been few slashing events in matured networks, all having diverse origins.</p><p>Nevertheless, we still want to have something that might indicate the issue.</p><p>Generally, we expect gathering data about AVS operators’ performance to be possible. It can still be used to rank Operators and spot signs of infrastructure disturbances, which then can be used as a proxy for downtimes & slashing risks. For example, if an Operator frequently (and recently) experiences spikes in attestation miss rates in some abstract protocol, they may face harsher problems in the future unless the problem is fixed. These algorithms and models based on performance data are yet to be developed, and their sensitivity must be fine-tuned.</p><p><strong>About Lambda</strong><br>Historically, <a href="http://p2p.org/?ref=p2p.org">P2P.org</a> extensively uses data services for internal needs (i.e., business analysis & planning) and external reporting (clients & research). Now, we aim to build a new data product to cover new data domains introduced by restaking.</p><figure class="kg-card kg-embed-card"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">We are working on the Lambda data platform with partners <a href="https://twitter.com/DroseraNetwork?ref_src=twsrc%5Etfw&ref=p2p.org">@DroseraNetwork</a> and <a href="https://twitter.com/OpenLayerHQ?ref_src=twsrc%5Etfw&ref=p2p.org">@OpenLayerHQ</a> to bring consensus layer data on-chain.<br><br>This innovation enhances Ethereum's EVM, providing accurate data for <a href="https://twitter.com/eigenlayer?ref_src=twsrc%5Etfw&ref=p2p.org">@eigenlayer</a> ecosystems and making it more developer-friendly.<br><br>Details in the 💬 <a href="https://t.co/BIz4bgRa73?ref=p2p.org">pic.twitter.com/BIz4bgRa73</a></p>— P2P.org (@P2Pvalidator) <a href="https://twitter.com/P2Pvalidator/status/1794032940512665879?ref_src=twsrc%5Etfw&ref=p2p.org">May 24, 2024</a></blockquote> <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></figure><p></p><p>Lambda is a data product from P2P<a href="http://p2p.org/?ref=p2p.org">.org</a> that originally stems from the staking data API for P2P clients. Lambda will offer pre-built real-time API endpoints for EigenLayer ecosystem builders, including:<br><br>- Operator performance metrics to monitor duties and slashing events for Beacon Chain, AVS, and Cosmos chains.<br>- Rewards and APRs to monitor profits from direct staking for each pair delegator-operator. It also includes rewards per re-staked ETH to measure the profit of re-staking.<br>- DeFi (DEX, Lend-borrow) reserves to manage liquidity for LRT.<br><br>The platform will also provide a customization engine for real-time APIs, allowing builders to integrate new endpoints without additional latency or loss in data quality. The Lambda team works with several AVS projects to explore integration methods. <br><br>Stay tuned for updates!</p><h3 id="conclusion">Conclusion</h3><p>In this blog post, we discussed risks that restakers might face when they choose the strategy and shared high-level recommendations around risk mitigation. There are still many open questions: slashing conditions and amounts are not stated for most of the AVSs, and Eigenlayer slashing logic has not been released yet. The restaking market is young, and protocols are not battle-tested. No slashing phase will give some time to work through unknowns.</p><p><a href="http://p2p.org/?ref=p2p.org">P2P.org</a> aims to actively contribute to risk evaluation discussion and continue working on risk assessment methodologies from qualitative and quantitative perspectives. As an operator in Ethereum and AVSs, we aim to navigate our clients and partners in the Eigenlayer ecosystem.</p><div class="kg-card kg-button-card kg-align-center"><a href="https://eth.p2p.org/auth?ref=p2p.org" class="kg-btn kg-btn-accent">Stake and restake your ETH with us!</a></div><h1 id="about-p2p-validator"><br><strong>About P2P Validator</strong></h1><p><a href="https://p2p.org/?ref=p2p.org">P2P Validator</a> is a world-leading non-custodial staking provider, securing over $7 billion from over 10,000 delegators/nominators across 40+ high-class networks.</p><p>Do not hesitate to ask questions in our <a href="https://t.me/P2Pstaking?ref=p2p.org">Telegram</a> chat or contact our team directly on X or LinkedIn. We are always open to communication.</p><hr><p><strong>Web:</strong> <a href="https://p2p.org/?ref=p2p.org">https://p2p.org</a></p><p><strong>Twitter:</strong> <a href="https://twitter.com/p2pvalidator?ref=p2p.org">@p2pvalidator</a></p><p><strong>Telegram:</strong> <a href="https://t.me/P2Pstaking?ref=p2p.org">https://t.me/P2Pstaking</a></p>
from p2p validator
<h2 id="introducing-babylon">Introducing Babylon</h2><p></p><h3 id="1-the-problem">1. The Problem</h3><p>Bitcoin is the most prominent and valuable cryptocurrency in the world. However, it lacks mechanisms for holders to earn passive income, similar to PoS networks such as Ethereum, leading to millions of idle Bitcoins. The evolving blockchain landscape, especially Proof-of-Stake chains, demands consistent security and liquidity contributions, a role Bitcoin has yet to play significantly.</p><p>Current yield-generating solutions for Bitcoin involve moving assets to centralized platforms, which must be wrapped or stored in custodial wallets. This introduces risks such as hacks and regulatory issues, undermining the blockchain's decentralization and security principles.</p><p>Babylon addresses these issues by offering a decentralized alternative that not only opens up new opportunities for Bitcoin holders to generate yields but also enhances the security and functionality of the broader blockchain infrastructure.</p><h3 id="2-babylons-solution"><br>2. Babylon's Solution</h3><p>Babylon is a PoS protocol designed to enable Bitcoin holders to stake their BTC in a secure and non-custodial manner, allowing them to earn rewards in tokens of chains they support.</p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/sVlmVDQFTBG3pHPkTQz0KzC-2lAP3woc2_MCJcFTUaXbYkd4NA1lwfmsmtP7_HfjUtHWytuiFJ_o7HsayVUEUWylqoVyzMX4oh1GTI3O3KpnJf-LjY50D2icGP-Sk_BkHn0nYHLnZNKbbKrJvLFDQ1M" class="kg-image" alt loading="lazy" width="1600" height="900"></figure><p></p><p><strong>The protocol includes two protocols:</strong></p><ul><li><strong>Bitcoin timestamping: </strong>This protocol sends succinct and verifiable timestamps of any data (such as PoS blockchains) to Bitcoin</li><li><strong>Bitcoin staking: </strong>This protocol allows Bitcoin, the asset, to provide economic security to any decentralized systems through trustless (and self-custodian) staking.</li></ul><p>At its core, Babylon allows Bitcoin users to directly stake their BTC, supporting Proof-of-Stake chains while simultaneously earning yields in tokens of chains they support. This capability transforms idle Bitcoin into active, yield-generating assets without requiring holders to relinquish control or security.</p><p><strong>The key features of Babylon include:</strong></p><ol><li><strong>Yield Generation:</strong> Users can earn rewards by staking their BTC directly on the platform.</li><li><strong>Fast Unbonding: </strong>A quick unbonding process allows users to withdraw their staked Bitcoin promptly.</li><li><strong>Non-Custodial Staking: </strong>Users maintain complete control over their BTC without transferring them to a third party.</li><li><strong>EOTS Signature for Security:</strong> This ensures security by ensuring the staked Bitcoin is locked and accounted for.</li><li><strong>Cross-Chain Interoperability: </strong>Facilitates interactions between different blockchain networks, enhancing the utility and reach of staked assets.</li><li><strong>Slashing Mechanism:</strong> Implements measures to penalize bad actors, thus safeguarding the network's integrity and user assets.</li></ol><p>Babylon presents an innovative and secure solution to the problems faced by Bitcoin holders and the broader blockchain ecosystem. </p><h3 id="3-how-does-it-generally-work">3. How does it generally work</h3><p>A user with BTC can secure the Babylon chain or other Cosmos PoS chains while receiving yields in their tokens. To do this, the user must lock their BTC coins on Bitcoin. Because Bitcoin doesn't support smart contracts, the user should initiate the staking process using a <a href="https://academy.binance.com/en/glossary/unspent-transaction-output-utxo?ref=p2p.org"><u>UTXO transaction</u></a> that creates a time lock for the BTC coins. This UTXO transaction has three main outputs: the time lock can expire, allowing withdrawal; the user can unbond their transaction before expiration; the transaction can be slashed if a validator acts maliciously.</p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/TlrRoo92Dv84SpZHXzPnf9Fld9RkMzwLc0MVuWAzbK1S5BfGbTDuaUNClgNPnCZcBGLuoDp57M9SR37k4b5hluaJY_52VYLSx0_d8sNUS1RivRQ65CI1o3t5gSg0GZqh4887RHI9GXK1O7YdkFNgwlg" class="kg-image" alt loading="lazy" width="1600" height="900"></figure><p>After signing the transaction, the user delegates their BTC tokens to a finality provider, who can validate the transaction. This allows the user to receive yield if the provider secures blocks correctly. However, if the finality provider acts maliciously, it can be slashed.</p><p>The cornerstone of the entire model is the pre-signed slashing transaction and EOTS keys. When staking, the user pre-signs a slashing transaction that can be broadcast to the network if the finality provider acts maliciously. If the provider double-signs a block, its EOTS keys are revealed, and the covenant committee can sign the pre-approved transaction using the finality provider’s private key.</p><ol><li><strong>Detection of malicious activity</strong>: Finality providers detect malicious activity, such as another finality provider signing a block twice.</li><li><strong>Exposure of private key:</strong> If malicious activity is detected, the malicious finality provider’s private key is leaked.</li><li><strong>Notification and slashing:</strong> The finality providers notify the covenant committee, which signs the pre-signed slashing transaction using the exposed private key and broadcasts it to the network.</li><li><strong>Slashing transaction:</strong> A predetermined amount of Bitcoins is sent to a burn address as a penalty for the malicious activity.</li></ol><p>The process results in securing PoS chains and receiving yields for BTC tokens, which depend on the chains the user secures. Initially, the Babylon chain will start on the mainnet by ensuring only the Babylon chain itself. Still, stakers can secure other Cosmos chains and receive yields in their tokens.</p><h3 id="4-investors-and-market-confidence">4. Investors and Market Confidence</h3><p>Babylon has successfully secured substantial funding across several rounds, showcasing strong market trust and investor interest in its innovative approach to Bitcoin staking.</p><p><strong>Seed Round: </strong>Babylon initiated its funding journey by raising $8.8 million in a seed round led by IDG and Breyer Capital, emphasizing early support from established investors in transformative technologies.</p><p><strong>Series A Funding: </strong>The momentum continued with a Series A round that raised $16 million. This round was co-led by Polychain Capital and Hack VC and saw additional participation from Framework Ventures, Polygon Ventures, Castle Island Ventures, OKX Ventures, Finality Capital, Breyer Capital, Symbolic Capital, and IOSG Ventures. The diverse investor base in this round highlights a robust endorsement of Babylon’s technology and strategic direction.</p><figure class="kg-card kg-image-card"><img src="https://lh7-us.googleusercontent.com/iOnLuQ4shVuFqN2B21LVeJzjF_xoeqOL8i5TivZan-49K6WHj6VtPMleRAZe0IRWU-j-KxO0wvO7sRt0vH0kvNTZtwqKUYTtLcGbYESkTieJT3rXMjDY_JujXlt_4a0S8RU3bcv5k3EH0d1CPhT5wkg" class="kg-image" alt loading="lazy" width="1600" height="900"></figure><p><strong>Last Round: </strong>Binance Labs made the most recent investment, reflecting significant strategic backing. This partnership provides financial resources and enhances Babylon’s capabilities in technology development and global market positioning.</p><p>These investment milestones fund Babylon's growth and affirm its potential as a significant player in the evolving landscape of blockchain technology and cryptocurrency.</p><h3 id="5-how-to-participate">5. How to Participate</h3><p>If you're interested in participating in the launch of Babylon, we recommend two main directions for involvement:</p><ol><li><strong>Testnet Participation:</strong> Engage with the Babylon testnet by staking your SignetBTC directly on Babylon’s <a href="https://btcstaking.babylonchain.io/?ref=p2p.org"><u>official website</u></a>. This allows you to familiarize yourself with the platform’s features and functionalities without risking real assets.</li><li><strong>Support for Large Bitcoin Holders: </strong>If you hold a significant amount of Bitcoin, don't hesitate to contact our team. We can provide tailored validator solutions that will be optimal for you when the mainnet launches.<br></li></ol><p>The Babylon is currently in the testnet phase, with the mainnet launch anticipated by the end of the first half of the year. The new testnet (bbn-test-4) will focus on the security of staked Bitcoins by testing user interactions with the BTC Signet test network. The Babylon team plans to launch this new testnet towards the end of May 2024. The team is closely monitoring updates and feedback from the community to ensure the robustness and security of the network before the mainnet launch. </p><p></p><h1 id="about-p2p-validator"><strong>About P2P Validator</strong></h1><p><a href="https://p2p.org/?ref=p2p.org">P2P Validator</a> is a world-leading non-custodial staking provider, securing over $7 billion from over 10,000 delegators/nominators across 40+ high-class networks.</p><p>Do not hesitate to ask questions in our <a href="https://t.me/P2Pstaking?ref=p2p.org">Telegram</a> chat or contact our team directly on X or LinkedIn. We are always open to communication.</p><hr><p><strong>Web:</strong> <a href="https://p2p.org/?ref=p2p.org">https://p2p.org</a></p><p><strong>Twitter:</strong> <a href="https://twitter.com/p2pvalidator?ref=p2p.org">@p2pvalidator</a></p><p><strong>Telegram:</strong> <a href="https://t.me/P2Pstaking?ref=p2p.org">https://t.me/P2Pstaking</a><br><br><br><br></p>
from p2p validator