Security & Operations

Custody and Services Providers:

Cryptocurrency security

  • Documented threat model, business continuity planning and key recovery procedures
  • Multi-signature cold storage in use when supported, otherwise key-splitting in effect.
  • Third parties engaged for additional software support and services