Conversation

Are the private keys on HSMs? How do the validators work? Has the validator code been audited (the PeckShield audit of the bridge didn't seem to include the validators, which are a key component of the system)?