About
Security
The Key Mechanisms to Protect Your Assets
1
Bulletproof security Test
Penetration tests, including Blackbox and Whitebox testing, are always conducted throughout the business cycle, including the development, test and launch stage, to make sure our system can defend against all kinds of attacks.
2
Source Code Auditing
Our first and foremost mission is to make sure all source codes are most secure in all infrastructure stages. All source codes are assessed by popular development tools which are widely used in the industry and are thoroughly checked in every version and on a regular basis. A unique ID is assigned to each user and the unique address is matched to each ID to avoid duplication.
3
Triple assurance
We have a three-level assurance mechanism to ensure the quality of our products and minimize risks for all clients. We have a development team to design source codes and a security team to double-check, while we have a business team to test the system with real digital assets before product launch.
4
Full control in all nodes
All nodes in our system are fully developed from scratch and absolutely controlled by internal development teams. Regular and consistent checks on all relevant chains are conducted to avoid any loopholes. An instant alert mechanism regarding nodes is always on to make sure we can fix any issue immediately.
1
24/7 Operations
A 24-hour alert and monitoring system is built and keeps on going from the application and infrastructure perspective. A Manual or Auto defense/recovery practice is initiated through the system immediately if any breach cases are triggered.
2
Audit Trail
All the activities are governed by an audit trail system to authenticate security and operational actions, mitigate challenges, or provide proof of compliance and operational integrity. Our system can promptly respond to mitigate against negative influences such as cyber threats, security breaches, data corruption, or misuse of information. launch.
3
Data Protection
The core purpose of data security is to ensure that hackers cannot steal customers' personal information. In our advanced infrastructure, all sensitive data including transaction data and personal information is encrypted and highly protected by strict access control.
Start to save, buy, transfer, swap and earn your coins and tokens safely and securely.