Loading...
logo
Earn

Copy Trading


Find Out How We Safeguard Your Assets

security

Don’t Fret Over Safety

We follow multiple techniques to safeguard your digital assets.

security

Public Bug Bounty Program Coming soon

As part of our ongoing commitment to ensuring the integrity of our exchange, we believe that by collaborating with the community through our bug bounty program, we can further safeguard our customers' data better. 

security

24x7 SOC Monitoring

Our risk analyst experts monitor your assets 24/7, safeguarding your crypto by actively combating evolving threats, and constantly refining SOC practices.

security

Secure Assets storage

We use the world’s #1 institutional storage solution to provide MPC wallet service to store our digital assets.

security

Principle of Least Privilege

We have strict controls on access rights to funds in both cold and hot wallets.

security

Proof of Reserve

An independent third-party institution certifies that there are 1:1 on-chain reserves for all user assets. 

security

Audited & Certified

Coming soon.

Multi-Layer Account security

Modal Info Icon

User Authentication and Access Controls

We Implement strong authentication mechanisms, like the two-factor authentication (2FA).

data security

Encryption

We use encryption for data in transit and data at rest to protect sensitive information from unauthorized access.

view_lock

Monitoring and Intrusion Detection

We’ve implemented robust monitoring systems to detect suspicious activities or unauthorized access using intrusion detection systems to identify and respond to potential threats in real-time.

search spy

Regular Security Audits and Assessments

Our security team conduct quarterly audits and assessments of virtual asset systems to identify vulnerabilities and weaknesses.

security_solution

Incident Response Plan

We have an incident response plan team that outlines the steps to be taken in case of a security incident.

virus_protection

Secure Development Practices

Our development team follows top-of-the-line coding practices when developing virtual asset systems to prevent vulnerabilities.

internet_firewall

Physical Security Measures

We safeguard the physical security for servers and other infrastructure housing virtual assets to prevent unauthorized access.

security_lock

Secure Network Architecture

We have implemented firewalls and intrusion prevention systems to protect the network infrastructure and set up segment networks to minimize the impact of a security breach.

personal_security

Regulatory Compliance

Our legal team stays informed about relevant regulations and compliance requirements related to virtual assets.

computer_password

Data Backups

Our System Administrator backs up critical data daily and ensures that backup systems are properly safeguarded.

global_network

Vendor Risk Management

We assess and manage the risks associated with third-party vendors providing virtual asset-related services by following industry best practices.

security_settings

Regular Security Updates

We Keep all software, including operating systems and applications, up to date with the latest security patches.