Security Policy
Security of funds and user information is our top priority.
Our security team is continually improving our end-to-end security measures, improving auditing processes, and reducing the 'attack surface' of our infrastructure. Please note that we cannot disclose too many details of the security measures implemented on the platform for security and proprietary reasons.
User account protection
- Some of the security measures highlighted below are in place by default, and others can be activated based on the security level you need. Please visit security section of your account to check the security status of your account and see recommendations.
- Two-factor authentication (2FA)
Add an extra layer of security to your account and protect sensitive operations such as logging in, generating API keys, and withdrawing. Configure two-factor authentication using Google Authenticator - Advanced verification tools
- Login data is saved and analyzed for unusual activity.
- Intelligent system detects IP Address changes to prevent session hijacking.
- Email notifications report logins and include a link to instantly freeze your account if you suspect malicious activity.
- Limit access to your account based on IP address.
Cryptocurrency storage
The overwhelming majority of system funds are stored in offline, multi-signature cold wallets. As an added protection, the cold wallets are not available from the platform or the platform servers.
System security
- Always up-to-date Linux systems to host the platform
- Our servers’ network is protected using always up-to-date software and the best possible practices.
- Automatic real-time backup of the database
- The platform database is backed up in real-time on encrypted hard-drives and is replicated in several geographical locations.