Skip to main content

Security

We bolster our primary server with an equally capable backup node, deploy automated scripts to minimize downtime, and maintain 24/7 on-call engineers using robust alerts.

  • Access to the product requires multi-factor authentication (MFA) and hardware security modules (HSMs).
  • We employ cutting-edge cryptography to protect sensitive assets against leaks, breaches, or future slashing risks.
  • We combine industry-leading monitoring tools with proprietary scripts and around-the-clock manual checks by our team to ensure maximum reliability.