Skip to Content
LearnSecurity ModelConsortium Members

Consortium Members

The Lombard Security Consortium consists of 15 independent institutional members that collectively govern all critical protocol operations. Members are selected to provide organizational, geographic, and operational diversity — ensuring no single category of institution could be compromised simultaneously to threaten the protocol.

15Members
10 of 15Threshold
5Categories

Security Consortium Members

Every critical operation requires cryptographic signatures from at least 10 of the 15 members (a two-thirds supermajority). This high threshold means even the compromise of five members simultaneously would be insufficient to authorize unauthorized actions.


Members by Role

Crypto Institutions

Major digital asset firms providing institutional credibility, regulatory compliance, and operational infrastructure.

G
Galaxy
Institutional digital asset financial services firm offering trading, lending, and investment management
O
OKX
Global cryptocurrency exchange and Web3 technology company
K
Kraken
Regulated US-based cryptocurrency exchange with a long track record in digital asset custody and compliance

Market Makers

Algorithmic trading and liquidity firms ensuring deep market expertise and real-time operational capabilities.

A
Amber
Digital asset trading and technology firm operating across global markets
W
Wintermute
Leading algorithmic market maker providing liquidity across centralized and decentralized exchanges

Mining Pools

Bitcoin mining operations with deep understanding of the Bitcoin network, block production, and on-chain activity.

A
Antpool
One of the largest Bitcoin mining pools by hashrate, operated by Bitmain
F
F2Pool
One of the oldest and most established Bitcoin mining pools, operational since 2013

Institutional Validators

Professional staking and validator operations with experience running mission-critical blockchain infrastructure.

C
Chorus.one
Institutional staking and infrastructure operator supporting multiple Proof-of-Stake networks
F
Figment
Enterprise-grade staking provider and blockchain infrastructure company
K
Kiln
Enterprise staking infrastructure platform serving institutional clients
P
P2P
Non-custodial staking platform operating validators across major blockchain networks

Security and Research

Specialized security, cryptography, analytics, and formal verification firms contributing technical rigor and independent oversight.

C
Cubist
Cryptographic security company and builder of CubeSigner, the HSM-based key management system used by the Consortium
I
Informal Systems
Protocol verification, formal methods, and distributed systems research firm
N
Nansen
Blockchain analytics and on-chain intelligence platform providing transparency and monitoring capabilities

Membership Requirements

Joining the Security Consortium is a rigorous process that includes:

  1. Infrastructure deployment — Candidates must deploy and operate the required signing infrastructure
  2. KYB review — Know Your Business verification ensures institutional legitimacy
  3. Network vote — Existing Consortium members vote on new member admission
  4. Smart contract update — The new member’s signing keys are added to the protocol’s governance contracts

This multi-step process ensures every member meets Lombard’s security, operational, and reputational standards before they can participate in protocol governance.


Next Steps

  • Security Model — Full overview of Lombard’s defense-in-depth architecture
  • Audits — Third-party security audits and continuous monitoring
  • Infrastructure — How the Consortium powers protocol operations
Last updated on