Your Safety is Our Utmost Priority. Tokenomy operates on a ‘Security-First’ principle. The following points address various aspects of the platforms:
- Security Philosophy
We adopt a systems-first approach in designing our internal risk and operations framework. From ensuring wallets are secured via multi-party computation (MPC), hardware security modules (HSM), and key sharding technologies, to working with best-in-class security partners, we are able to provide peace of mind to our members in securing crypto assets on Tokenomy.
- Security Infrastructure
We place zero trust in any single authorized individual, and instead rely on proven and dependable system frameworks.
Website data is transmitted over encrypted Transport Layer Security (TLS) connections (i.e. HTTPS).
Internal applications have highest level access controls and are never exposed to the public internet.
Bug bounty programs leverage the broader security community to constantly evaluate potential threats.
Business Continuity Planning (BCP) in place to ensure 24/7 operation of all Tokenomy platforms
Rate limiting to prevent DDoS attacks
- Asset Custody Solutions
All crypto assets on Tokenomy platform enjoy the benefits of our underlying custody systems, which employ a blend of completely offline & air-gapped cold storage solutions to MPC and HSM-based wallet infrastructure. Our platform provides institutional-grade security with decentralization of control over assets ⏤ ensuring no single point of failure
We minimize crypto wallets that connect to the Internet (hot wallets) and maintain an insurance fund to cover 100% of the hot wallet balance if a cyber attack were to take place on our platform.
- Information Security
All sensitive user account information in our databases is encrypted. Access to user data is strictly limited to key staff on need-to-know basis only.
- Internal Controls
All employees are subject to ongoing criminal, security and credit background checks throughout their employment.
All remote access of funds require physical human authentication via hardware tokens.
For more information please visit here