Back to home
Security
Security
How we protect your assets and data.
Non-Custodial Architecture
Your keys, your crypto. We never have access to your private keys.
- Private keys never leave your wallet
- All transactions require your explicit approval
- We cannot move or access your funds
- Self-custody means you maintain full control
Infrastructure Security
Enterprise-grade security for our platform.
- End-to-end encryption for all communications
- SOC 2 Type II compliance in progress
- Regular third-party security audits
- DDoS protection and rate limiting
Data Protection
Your data is encrypted and protected.
- AES-256 encryption at rest
- TLS 1.3 for data in transit
- Minimal data collection policy
- GDPR compliant data handling
Operational Security
Best practices throughout our operations.
- Multi-factor authentication required for team
- Principle of least privilege access
- Continuous monitoring and alerting
- Incident response procedures
Security is an ongoing process. While we implement industry best practices, no system is 100% secure. Always practice good security hygiene with your own wallet and credentials.