Open Bug Bounty
Self-hosted bug bounty program to engage ethical hackers in search of vulnerabilities.
Regular security audits from top security companies to further improve application security.
Secure Cold Storage
Industry-leading Cold Storage solution utilizing Hardware Security Modules (HSM) to ensure asset security.
Strict Internal Policies
A set of documented guidelines to mitigate an internal threat: data leakage, malware infection, etc.