🔐 Security Framework

Security
Measures

Multi-Layered Defense Strategy

Our comprehensive security framework addresses every aspect of digital asset protection, from custody to operational security.

The Five Pillars of Security

1

Qualified Custodian Partnerships

Secure, geographically distributed cold storage with leading regulated custodians

2

Comprehensive Asset Insurance

Crime insurance protecting against theft, hacks, and loss of private keys

3

Advanced Technological Safeguards

Multi-signature and Multi-Party Computation protocols for fund movements

4

Privacy & Data Protection

GDPR and CCPA compliant data protection with encryption and access controls

5

Continuous Monitoring

24/7 threat intelligence and real-time security monitoring

Security Statistics

99%+
Assets in Cold Storage
24/7
Security Monitoring
Multi-Sig
Authentication Required
Global
Insurance Coverage

Asset Custody & Storage

Institutional-grade custody solutions providing maximum security for client assets

Cold Storage Infrastructure

The vast majority of client assets are held in secure, geographically distributed cold storage with leading, regulated Qualified Custodians. This segregates client funds from the exchange's operational funds, offering the highest level of protection available.

  • Geographic distribution across multiple secure locations
  • Air-gapped systems with no internet connectivity
  • Physical security including biometric access controls
  • Bankruptcy protection and segregated client funds

Multi-Signature Security

All fund movements require authorization from multiple trusted parties through our multi-signature (multi-sig) and Multi-Party Computation (MPC) protocols, ensuring no single point of failure.

  • Multiple signature requirements for all transactions
  • Distributed key management across multiple parties
  • Hardware security modules (HSMs) for key storage
  • Time-delayed withdrawals for large amounts

Cybersecurity & Threat Protection

Advanced cybersecurity measures protecting against evolving threats

Real-Time Threat Intelligence

Continuous monitoring using advanced AI and machine learning to detect and respond to threats in real-time.

Penetration Testing

Regular security assessments by third-party experts to identify and address vulnerabilities before they can be exploited.

DDoS Protection

Enterprise-grade DDoS protection and traffic filtering to ensure platform availability during attacks.

Comprehensive Asset Insurance

Coverage Details

We have secured comprehensive crime insurance through a syndicate of world-class underwriters. This policy protects assets held in both our cold and hot wallet systems against theft, hacks, and loss of private keys.

  • Protection against theft and unauthorized access
  • Coverage for cybersecurity incidents
  • Loss of private keys protection
  • Employee dishonesty coverage

Peace of Mind

This insurance provides an essential financial backstop and peace of mind for our clients, demonstrating our commitment to protecting their assets beyond just technological measures.

Key Benefits:

  • • World-class underwriter syndicate
  • • Comprehensive coverage terms
  • • Financial protection for clients
  • • Enhanced confidence in platform security

Security Incident Response

We maintain a comprehensive incident response plan with 24/7 security operations center monitoring and rapid response capabilities. Our security team is equipped to handle any security events and communicate transparently with affected users.

Report Security Issues

If you discover a security vulnerability or suspicious activity, please report it immediately to our security team:

Security Team: [email protected]

We appreciate responsible disclosure and will work with security researchers to address any identified issues.