Hello everyone !
Behind InchainWorks is a team with 8+ years of professional experience in IT. We have been contributing these last years extensively in the blockchain scene in various (DPOS/POS) projects through running testnets, full nodes, as well as developing blockchain tools (monitoring, auto-balancing, auto reward distribution ….) and maintaining a blog in french about the projects we are working on. This whole journey has helped our team acquire a considerable amount of knowledge on the field. Those knowledges we acquired, are now being used in order to ensure the nodes we manage are maintained and operated in the best achievable conditions. In fact, part of our operations now consists on operating, maintaining and securing ‘validation’ nodes for DPOS and POS blockchain networks as well as providing staking services and maintaining a blog in french. We currently run nodes on different projects such as Polkadot, Joystream, ethereum 2.0, Nucypher, and kava Testnets, and PIVX, Syndicate, IRISnet and Kusama mainnets.
Why stake with us?
We understand that the value of any network relies on the security of each of the nodes that compose it. We do also understand that compromising one node means compromising the whole network. In fact, any component of the network should be able to protect itself from an ever-expanding list of intrusions and attacks. That is why our team constantly strives to achieve the highest possible security standards for the nodes we maintain and operate. Our experience have allowed us to set up a node’s security best practice which is constantly updated and upgraded and that is applied to any of the nodes we set up. We also have our own multichannel monitoring software that notifies us whenever there is a problem with any component of our platform. Besides that, we also make use of monitoring software provided by the trusted validators.
We offer a hybrid approach to infrastructure which consists of having multiple public clouds from different service providers, while taking into account redundancy as well as uptime through setting up two backup nodes for each node we operate; that will take over in case the main one is malfunctioning. Moreover,
we have structured our network topology in a two layered sentry node architecture. In this configuration, our validator nodes are isolated from other nodes in the network, and are only connected to their private sentry nodes. They are based on different public clouds which are privately and solely connected to our validator node servers which are located in secured colocation data centers. Those private sentry nodes are in their turn connected to our public sentry nodes, which are connected to the internet. This allows us to mitigate the risk of compromised key through hardware security modules , hide the IP address of the validator node as well as those of our private sentry nodes and last but not least protect our validator node from DDoS attacks.
An uptime of 99,0182% have already been proven with previous and actual nodes we manage. Our current environment, network infrastructure and security practices are extremely reliable.
Validator Address : DbAdiLJQDFzLyaLsoFCzrpBLuaBXXqQKdpewUSxqiWJadmp