Your safety is our main focus.

A secure digital fortress for your investments

Get Started
or Download the App
Download app for iOS Download app for Android's Strategic Partnerships has
strategic partnerships

with all the industry leading authorities in custody and compliance.

FireblocksVeriffSiftCloudflareChainalisysAmazon Web ServicesAzure

Key compliance features

At our company, we know that being compliant is essential in today’s business world.

Experience peace of mind with our key compliance features, including the highest level of security and safety measures, automated monitoring, ethical business practices, and many more which can be discovered below…

Risk Management

We believe that effective risk management is essential to the success and sustainability of our business. We have established a robust risk management framework that enables us to identify, assess, prioritize, and mitigate risks across our organization.

ABC Risk Assessment
ABC Risk

We are committed to upholding the highest standards of ethical business practices. As part of this commitment, we regularly conduct ABC risk assessments to ensure that our business operations remain free from any illicit activities or corrupt practices.

Financial Crime Policy
Crime Policy

We believe that our financial crime policy is critical to maintaining the trust of our customers, regulators, and other stakeholders. By adhering to the highest standards of financial crime prevention, we are able to operate with confidence and provide our customers with the highest level of service and security.

Compliance Program

We have a comprehensive compliance program in place to ensure that we comply with all relevant laws and regulations to ensure its effectiveness and remain committed to conducting our business with integrity and in full compliance.

Internal Audit

We prioritize the security and safety of our clients. We take a proactive approach to preventing and detecting fraud by maintaining strict security measures, including robust authentication systems and encryption protocols. We conduct thorough customer due diligence and implement strict know-your-customer (KYC) procedures to prevent money laundering and terrorist financing.

Whistleblowing Compliant

We are proud to be whistleblowing compliant. Our policy encourages clients and employees to report any suspected violations without fear of retaliation.Our commitment to integrity and accountability includes maintaining a culture of transparency and trust.

Security Risk Assessment
Security Risk

We are using the security risk assessment as a process of identifying, analyzing, and evaluating potential threats and vulnerabilities to our organization's assets, such as its people, information, infrastructure, and systems.

Key security features is fortified with all the necessary security measures to ensure the safety of your investments at all times

Two Factor Authentication


By default, in order to access your account and make withdrawals, Two-Factor Authentication (2FA) is required.

Adding an extra layer of security to the authentication process, two-factor authentication makes it more difficult for attackers to gain access to a person's devices or online accounts. This is because even if the victim's password is hacked, the password alone would not be sufficient to pass the authentication check.

Device Whitelisting

Device Whitelisting

It is a security feature used to restrict account access only to trusted devices.

Users can only access their account from a device that has been previously approved by the exchange. When a user logs in from an unapproved device, they will be required to verify their identity and authorize the device before they can access their account. Device whitelisting is designed to prevent unauthorized access to a user's account even if an attacker manages to obtain the user's login credentials.

Withdrawal Confirmations

Withdrawal Confirmations

Every withdrawal is verified so you can relax, knowing your funds are going in the right direction.

Withdrawal confirmations refer to the process of verifying and approving a request to withdraw funds from an account. They are an important security measure to prevent unauthorized access to an account and to ensure that funds are only withdrawn by the account owner or authorized users.

Biometric Identification

Biometric Identification

We use biometric identification because it's more secure and difficult to forge or steal than traditional identification methods such as passwords or PINs.

Biometric identification refers to the use of unique biological characteristics to identify and authenticate individuals. This can include physical traits such as fingerprints, facial features, iris or retinal patterns, voice recognition, or even behavioral traits such as typing rhythm or gait.

Military Grade Encryption

Military Grade
256-bit encryption

We use one of the strongest forms of encryption available.

Full Blockchain-Based Smart Contract Security

Full Blockchain-Based
Smart Contract Security

A smart contract that is deployed on a blockchain network, and is capable of executing its code in a decentralized manner, without the need for intermediaries.

Extensive Firewall Server Architecture

Extensive Firewall
Server Architecture

The network infrastructure employs multiple layers of firewall protection to secure and monitor incoming and outgoing network traffic.

We are licensed and regulated

By the Polish General Inspector of Financial Information

By the Lithuanian Financial Crime Investigation Service

Stay up to datewith all the news

We're sharing everything you need to know from the financial & investment world