Exploring Models of Staking

This is Part Two in our Staking series. Click here to read Part 1.
Staking is frequently a mischaracterized and misunderstood activity, in large part due to a lack of understanding surrounding the fundamental principles of staking as well as the different models. Staking is an integral part of the infrastructure that keeps a blockchain functioning and secure. It is a technological activity utilizing hardware and software, and reliant on communications over the internet. It determines who participates in the updating of the blockchain to maintain Byzantine fault tolerance. It does not require the participant to transfer ownership of their tokens to a third party - it is not lending or custody —but some models do involve the token owner transferring control. While rewards are in place to act as an incentive for participants to stake their tokens, this is an outcome of the process, not the driver for it.
PoS includes several variations, each catering to different user needs and blockchain architectures.
Solo or Direct Staking
Users run their own validator nodes via their own software and hardware, maintaining full control over their staked assets and potentially receiving higher rewards than if they were using a third party. However, the barrier to entry for solo staking is high - there is significant technical expertise required as well as a large up front equipment cost. Additionally, there is the cost of the stake that must be posted: 32 ETH to activate a validator on Ethereum, 2000 AVAX on Avalanche, for example. Users are solely responsible for maintaining hardware uptime and security, and therefore will bear the full effect of any penalties from the protocol if there are failings.
Third party models
The term Staking-as-a-Service (StaaS) is often used very broadly in the blockchain ecosystem, but is actually not particularly helpful, as it is too generic a description. A third party can manage many different aspects of the staking process for users depending on a number of factors; it is best therefore to split this category out.
Non-custodial delegated staking: Token holders stake their cryptoassets via a self-hosted wallet but delegate validator operation to a third party, such as a StaaS provider, in exchange for a service fee. This reduces costs and technical complexity compared to solo staking while ensuring that only the token holder can sign transactions, claim rewards, and unstake using their private keys.
Custodial delegated staking: many large cryptoasset custodians now offer staking as an ancillary activity. The custodian stakes the tokens (with permission) on behalf of the token holder in exchange for a service fee. While the third party will take custody of the assets in this example, it is because of their nature as a custodian, not because staking requires it. Custodians can store the tokens in different wallets based on the requirements of the tokenholders: segregated staking keeps the tokens entirely separate from others and there is no co-mingling of assets; omnibus staking puts all tokens together in an omnibus or aggregated wallet, lowering the barrier to entry; pooled staking combines assets across multiple participants in return for a ‘share’ of an already active staking position.
Liquid Staking:
A commonly cited concern with staking is that once a token is staked to the network, it can’t be accessed until the end of the lock up period. Liquid staking providers allow tokens to be deployed via a protocol to receive a receipt token (or Liquid Staking Token (LST)) which acts as proof of the underlying staked tokens and any associated rewards.
The LST can then be deployed in other activities e.g. on Defi protocols and can continue earning rewards.
Staking isn’t a one-size-fits-all approach—different models cater to different needs, from solo staking for those who want full control to third-party and liquid staking options that lower barriers to entry. That’s why it is important to read the fine print on whichever model you choose. While these models make staking more accessible and flexible, they also come with varying degrees of risk, from slashing penalties to counterparty exposure. So, what should you watch out for when staking your assets? In our final post, we’ll explore the key risks and considerations to keep in mind before getting started. Stay tuned!