Staking
Cardano is built on the ground-breaking PoS consensus protocol Ouroboros, and the first blockchain consensus protocol to be developed through peer-reviewed research. At the heart of the protocol are stake pools, reliable server nodes run by a stake pool operator to which ada holders can delegate their stake
Delegate your ADA to a stakepool to earn rewards while helping to validate and decentralize the cardano blockhain
Want to learn more about Staking?
About Us
STLL is a West Australian Cardano Stake Pool. The pool administration and infrastructure is managed by an experienced control systems engineer. We run a hybrid pool with self hosted bare metal infrastructure and cloud backup nodes. This keeps the pool and the network resilient while using low power and highly performant servers.
Contact us on Twitter for any enquiries from basic crypto questions to complex technical queries.
Future proofed and robust architecture
Geographically distributed & DDOS resistant
Air-Gapped and fortified security
Commited to supporting local Dog Refuges
Crypto Security
A central tenet of the cryptocurrency movement is the idea that we should control our own assets without intermediaries that can restrict our access to or spend those assets without our permission. This concept is often referred to as self-custody.
When you practice self-custody, you create your own wallet or key pair for which you are solely responsible.
Typically, after purchasing a cryptocurrency asset on a centralized exchange, proponents of self-custody will create their own wallet and transfer the asset off the exchange to this wallet address. Trusting a centralized party to custody your asset is a risk that runs against the philosophy of many crypto adherents. There are numerous examples in the industry of centralized exchanges losing customer funds through ignorance, data breaches, or pure malfeasance.
When people take the step to custody their own cryptocurrency, there are many security practices to consider.
Hardware Wallets
The gold standard for crypto security, hardware wallets store the keys to your crypto wallet in a secure chip on a device without an internet connection. These devices often require a password and interaction with a physical device to sign transactions for that wallet. Examples of popular hardware wallets include Ledger, Trezor, Tangem, and Keystone.
Air-gapped keys or Storage
You can also generate keys yourself and store them on a separate device, such as an old computer or a Raspberry Pi single-board computer (SBC). When keys are generated and stored on a computer, they should be created on a device that has no internet connection and is NEVER connected to the internet. These devices are known as air-gapped devices.
Additionally, there are security-focused operating systems like TAILS that can be loaded onto a USB drive. TAILS provides arguably the most secure operating system publicly available and can be used to store and encrypt your seed phrase.
Other popular options for air-gapped storage include password-protected SSDs or USB drives. Remember that when using these devices, they should be used exclusively on devices that are not connected to the internet and will not retain your input in memory (which is why we recommend using TAILS).
To enable persistent storage on TAILS, see this guide.
Seed Phrase Management
When you generate a wallet through most major wallet platforms, instead of generating a key yourself via a CLI (command line interface), you are often creating a wallet based on a mnemonic key phrase, also known as a Seed Phrase. This seed phrase essentially represents the complete key to that wallet, and anyone who can see, copy, or exfiltrate a raw seed phrase can immediately spend and transfer all of your cryptocurrency.
For these reasons, it is incredibly important to never store your seed phrase in plain text on any internet-connected computer; it should also be kept hidden securely. Storing a seed phrase in plain text in an open digital environment is risky.
However, there are methods we can employ to enhance our security:
- Store your seed phrase in a password manager like KeePass on an air-gapped computer. We do not recommend storing a seed phrase on a commercial password manager or any cloud-based service.
- Avoid ever taking a photograph of your seed phrase with your phone or any other camera.
- Write down your seed phrase on paper and store it securely. However, be cautious—anyone who catches a glimpse of it could potentially take a picture or steal it. Keep in mind that paper can degrade, get damaged, or even burn.
- Enhanced Redundancy: Consider using Shamir’s Secret Sharing
. This system involves breaking a seed phrase into three parts, where any two parts can be used to recreate the entire seed phrase. However, any single part is insufficient to access the wallet. This way, if one part is lost or compromised, you do not lose access to your cryptocurrency.
Scams and Transaction Safety
When you are interacting with any dApp or application you need to be hyper vigilant. There are criminals and scammers the world over trying to steal funds from cryptocurrency users. A simple way to avoid being scammed is to never share your seed phrase and never sign any transaction that looks suspicious. Simply double check the inputs and outputs of every transaction before you sign it. If more tokens or more of the base asset are being removed than you anticipated DO NOT sign that transaction. There are often scams parading as ‘reward tokens’ or fake crypto support scammers who will ask you to interact with a suspicious website which get you to unwittingly sign a transaction sending away all or more of your funds than anticipated. Other scams involve trying to get you to divulge your seed phrase. You should never EVER share your seed phrase with anyone.