We follow multiple techniques to safeguard your digital assets.
As part of our ongoing commitment to ensuring the integrity of our exchange, we believe that by collaborating with the community through our bug bounty program, we can further safeguard our customers' data better.
Our risk analyst experts monitor your assets 24/7, safeguarding your crypto by actively combating evolving threats, and constantly refining SOC practices.
We use the world’s #1 institutional storage solution to provide MPC wallet service to store our digital assets.
We have strict controls on access rights to funds in both cold and hot wallets.
An independent third-party institution certifies that there are 1:1 on-chain reserves for all user assets.
Coming soon.
We Implement strong authentication mechanisms, like the two-factor authentication (2FA).
We use encryption for data in transit and data at rest to protect sensitive information from unauthorized access.
We’ve implemented robust monitoring systems to detect suspicious activities or unauthorized access using intrusion detection systems to identify and respond to potential threats in real-time.
Our security team conduct quarterly audits and assessments of virtual asset systems to identify vulnerabilities and weaknesses.
We have an incident response plan team that outlines the steps to be taken in case of a security incident.
Our development team follows top-of-the-line coding practices when developing virtual asset systems to prevent vulnerabilities.
We safeguard the physical security for servers and other infrastructure housing virtual assets to prevent unauthorized access.
We have implemented firewalls and intrusion prevention systems to protect the network infrastructure and set up segment networks to minimize the impact of a security breach.
Our legal team stays informed about relevant regulations and compliance requirements related to virtual assets.
Our System Administrator backs up critical data daily and ensures that backup systems are properly safeguarded.
We assess and manage the risks associated with third-party vendors providing virtual asset-related services by following industry best practices.
We Keep all software, including operating systems and applications, up to date with the latest security patches.