We're now supporting Polygon zkEVM!
Learn more here.
The security of your data and the integrity of our systems is important to us. You can trust that we take careful measures to ensure your data is as safe as possible.
All data is encrypted in transit and at rest so you don't need to worry about your personal information being leaked
Requests are verified and filtered for SQL injections to prevent CSRF attacks
Application credentials are hashed and isolated from the rest of the product
Attributes are whitelisted on all models to prevent mass-assignment vulnerabilities
Important actions are rate limited to prevent DDoS attacks
Private keys are never stored so you're never at risk of having your funds stolen
Only trusted peers are used so we can maintain a large degree of confidence in our data's accuracy
Backups are performed regularly so no node is ever too far behind the tip of the chain
Continuous software vulnerability scans directly integrated within our software development process
Third party audits are performed on our entire system to look for vulnerabilities
Employees go through a rigerous screening process including a criminal background check
Employees are required to encrypt their hard drives, utilize strong passwords, use 2FA, and enable screen locking