Transaction Security
Security is of the highest importance to us, and our platform is built to safeguard each step in the transaction lifecycle.
Authentication
Authorisation
Signature
Broadcast
Authentication
To prevent the risk of impersonation, our platform implements strong multi-factor authentication via email and a dedicated mobile app.
Hardened by a security sentinel, the mobile app protects users and businesses against phishing and man-in-the-middle attacks by delivering a secure out-of-band authentication channel.
To further prevent unauthorised access, our authentication app, available on iOS and Android, leverages biometric security features such as facial and fingerprint recognition.
Authorisation
Our multi-layered security architecture ensures that transaction approval is always enforced as expected.
Our bank-grade policy engine features a tamper-detection mechanism which prevents any attempt to bypass company-approved policies.
We use reliable cryptographic techniques to ensure authorisation is only granted after policy-defined approval quorum are fully reached.
Signature
Built upon the foundations of threshold cryptography, our platform delivers next-generation keyless transaction signature.
Our solution removes the risk of private key theft by decoupling transaction approval from signature, and by leveraging multiparty computation.
To further reduce the risk of downtime, compromise or collusion, our multiparty computation model is uniquely strengthened by three independent computing parties .
Broadcast
To ensure prompt processing, signed transactions are broadcast to their relevant network by dedicated full blockchain nodes available 24/7/365.
Our dedicated nodes are configured without transactional capabilities and are used only to broadcast and receive messages to and from their blockchain network .
Hardened Core
All components of our platform run on tailor-made hardened OS with reduced attack surfaces.
All communications between components are conducted using TLS (Transport Layer Security).
All components operate in sandboxed environments to further mitigate risk.
All services are hosted in SOC 1, SOC 2 & SOC 3 compliant data centres.