-Encryption and Storage
Elaborate on the encryption methods used for data in transit and at rest, including the use of cold storage for the majority of assets to mitigate risks.
-Auditing and Compliance
Provide details on the frequency and scope of security audits, including the names of third-party auditors, and mention adherence to international security standards.
-User Security Practices
Offer recommendations for users to secure their accounts and digital wallets, including two-factor authentication, regular password updates, and phishing awareness.
Last updated