SECURITY POLICY

1. Privacy policy
1.1

Security of assets and user data stored on the website is our first priority.

1.2

To increase security, the service constantly adds new levels of protection, improves audit processes and reduces the “attack surface” in its infrastructure. Within the frame of the intellectual property security and protection, we cannot disclose all the information about the protective measures used on our platform.

2. User account protection
2.1

Not all of the security measures described below are activated in the default mode, but you can activate them by yourself in the / security section, depending on the required level of security. There you can check the security status of your account and see recommendations for its protection.

3. Two-factor authentication (2FA)
3.1

This level of security is used to secure the most important operations conducted in your account, such as authorization, creating API keys and withdrawal of funds. You can control two-factor authentication using Google Authenticator, Twilio, or U2F security key.

4. Advanced verification tools for control of account integrity
4.1

All authorization data is stored and verified for suspicious activity.

4.2

The intelligent system tracks IP address changes to avoid hacking during a working session.

4.3

Notifications with authorization reports and a link to a quick account freeze in case of suspicious activity are received at the specified e-mail inbox.

5. Withdrawal protection
5.1

The security system automatically tracks withdrawal operations using IP address and other patterns of user actions, and initiates a manual check of administrator in case it detects suspicious withdrawals.

5.2

Confirmation procedure of funds withdrawal is resistant to malicious modules in the browser.

5.3

Adding addresses to the white list of addresses will prevent the withdrawal of funds to third-party resources.

6. Cryptocurrency repository
6.1

Majority of digital assets in the system are stored in stand-alone “cold” wallets. Only about 0.5% of the cryptoactives are in “hot” wallets for use in everyday operations. To ensure a high level of security, you cannot get an access to the “cold” wallets from the platform itself and its servers. The right to manual access to the funds in the autonomous “cold” wallets is only granted to a few chief administrators.

7. System security
7.1

To host the platform, we use the latest Linux systems.

7.2

We use the best computer security practices and protect our servers with the latest software.

7.3

The database is automatically backed up once a day.

7.4

Once a day, a backup copy of the trading platform database is created, after that it is encrypted and archived.

8. System security
8.1

The created backup copy (database, log files, etc.) is immediately sent to several remote from each other physical servers.

9. DDoS-attacks protection
9.1

We use automatic protection against service denial kinds of distributed attacks, so that external attacks cannot affect the course of trading.