Security Policies

Stake Security

We operate blockchain validators that facilitate the staking of digital assets. Stakers retain sole ownership and control of their staked funds. We do not have access to or control over stakers' funds, with the exception of our own staked assets.

System Security

We implement a rigorous system of regular patching to ensure the reliable and stable operation of our systems. For each blockchain we support, we maintain dedicated testnet servers to thoroughly test any changes prior to their deployment on our production systems.

Network Security

We employ advanced network security measures and technologies to safeguard our infrastructure. Access to company resources is strictly controlled. Additionally, our data centers are equipped with cutting-edge capabilities to mitigate modern DDoS attacks.

Physical Security

Our infrastructure is secured within state-of-the-art data centers worldwide. Access to these facilities is restricted to authorized individuals. Only designated personnel are granted access to our systems

For any questions or concerns, please contact us to discuss.