🔐Security
Launchnodes simplifies node deployment with a user-friendly interface that allows you to generate and download keys without needing to use the command line. No one—including Launchnodes—has access to your infrastructure. For further security improvement, Launchnodes provides the following steps and recommendations to ensure your node setup and key download process remains secure:
Use a VPN For enhanced security, we recommend using a VPN when deploying the node or accessing the CSM Staking UI dashboard. Please note that our testing has indicated Cloudflare VPN often blocks UI pages, making it a suboptimal choice for node deployment. Ensure a VPN is active before setting up your nodes. DO NOT SET UP NODES WITHOUT A VPN (we recommend Nordlayer).
Secure Network Use a home broadband connection or a secure corporate network to set up your nodes. Avoid using any public or shared Wi-Fi networks.
Restrict IP Access Your AWS or GCP instance should be connected only to the specific IP address/device you are using to configure your nodes.
Password-Encrypted Keys Your Ethereum validator keys are secured with password encryption, providing an additional layer of protection. This ensures that even in case of unauthorized access, the keys remain safe and cannot be used without the password. As a critical component in the Ethereum network, validator keys must be protected to maintain the integrity of the staking process. With password encryption, your keys are safeguarded from misuse, ensuring that they cannot be used to run validators or compromise your staking rewards.
If you have any questions about security, feel free to contact us at support@launchnodes.com.
Last updated