Our comprehensive security framework addresses every aspect of digital asset protection, from custody to operational security.
Secure, geographically distributed cold storage with leading regulated custodians
Crime insurance protecting against theft, hacks, and loss of private keys
Multi-signature and Multi-Party Computation protocols for fund movements
GDPR and CCPA compliant data protection with encryption and access controls
24/7 threat intelligence and real-time security monitoring
Institutional-grade custody solutions providing maximum security for client assets
The vast majority of client assets are held in secure, geographically distributed cold storage with leading, regulated Qualified Custodians. This segregates client funds from the exchange's operational funds, offering the highest level of protection available.
All fund movements require authorization from multiple trusted parties through our multi-signature (multi-sig) and Multi-Party Computation (MPC) protocols, ensuring no single point of failure.
Advanced cybersecurity measures protecting against evolving threats
Continuous monitoring using advanced AI and machine learning to detect and respond to threats in real-time.
Regular security assessments by third-party experts to identify and address vulnerabilities before they can be exploited.
Enterprise-grade DDoS protection and traffic filtering to ensure platform availability during attacks.
We have secured comprehensive crime insurance through a syndicate of world-class underwriters. This policy protects assets held in both our cold and hot wallet systems against theft, hacks, and loss of private keys.
This insurance provides an essential financial backstop and peace of mind for our clients, demonstrating our commitment to protecting their assets beyond just technological measures.
We maintain a comprehensive incident response plan with 24/7 security operations center monitoring and rapid response capabilities. Our security team is equipped to handle any security events and communicate transparently with affected users.
If you discover a security vulnerability or suspicious activity, please report it immediately to our security team:
Security Team: [email protected]
We appreciate responsible disclosure and will work with security researchers to address any identified issues.