Securing blockchains and related topics such as Layer-2 (L2), Oracle services and similar varies in the details. We take the “not your keys – not your coins” approach. Only such protocols are protected wherein your crypto assets remain in your control. For example, we make use of the concept of delegations for proof-of-stake protocols or require your operation of a separate node for L2 Bitcoin Lightning.