Caratteristiche di sicurezzaThe Majority of Customer Funds are Stored Offline.Offline storage provides an important security measure against theft or loss. We distribute wallets and backups of those wallets in multiple offline locations.
Two-Factor AuthenticationIn addition to your username and password, you'll enter a code from your mobile phone or secondary email address, adding a extra layer of security for your account.
Best PracticesOur website traffic runs entirely over encrypted SSL (https) using Extended Validation (green bar) certificates. Wallets (and private keys) are stored using AES-256 encryption.
FirewallWe use firewalls to only allow authorized access to specific ports
Security ScanningWe employ a 3rd party to scan our networks for any security issues.
OrganizationEmployees must pass a criminal background check as part of the hiring process. We use separate two factor authentication for admin level services.
ApplicationWe use SQL injection filters and verify the authenticity of POST, PUT, and DELETE requests to prevent CSRF attacks. All requests pass through a security layer to prevent DDoS and other security threats.
AuthenticationWe hash passwords stored in the database (salted bcrypt). We check for strong passwords on account creation and password reset.