WalletCoreWalletCore
HomeAboutFeaturesSecurityCareersPressFAQContact
Log inCreate wallet

© 2026 CryptoWallet

TermsPrivacyCookies
CompareGuidesIntegrationsAssetsChangelogRoadmapStatusAUPDeveloper TermsDPABDTC DisclosuresPrint All TermsSub‑processorsRetentionPrivacy TransparencyPrint All PrivacyWhitepaperExplorer
Abstract security backdrop

Security you can count on

From keys to sessions, we layer protections so you don’t have to think about them.

Create walletLog in
🧩

HSM / MPC custody

Hardware-backed or multi-party key management to protect private keys.

🔐

Encryption in-depth

Data encrypted in transit (TLS) and at rest with strong ciphers.

🧾

2FA + sessions

TOTP 2FA, device approvals, session history, and logout-all.

🧠

Monitoring & limits

Anomaly detection, rate limits, and withdrawal controls.

Compliance-ready
KYC / AML
Data protection
GDPR
Security practices
OWASP

Security architecture

Key shards & custody

MPC/HSM-backed custody with segregated shards and strict access controls.

Cold storage & windows

Tiered cold storage and withdrawal windows to reduce operational risk.

Environment isolation

Production access is tightly scoped; changes reviewed and auditable.

Least privilege

Principle of least privilege, periodic access reviews, and logging.

Data protection

Encryption in transit & at rest

TLS for data in motion; strong ciphers and hardened storage at rest.

Key rotation & secrets

Managed keys, regular rotation, and secure secrets management.

Backups & restore tests

Encrypted backups with scheduled restore drills to validate recovery.

Account security

Strong auth

Email verification, TOTP 2FA, optional approvals for higher risk actions.

Devices & sessions

Approve devices, review sessions, and one‑click sign‑out everywhere.

Alerts

Login notifications, unusual activity flags, and helpful guidance.

Transaction safety

Risk checks

Velocity limits, pattern checks, and hold reviews for unusual flows.

Address allowlisting

Restrict withdrawals to trusted destinations for additional safety.

Approvals & thresholds

Optional approvals and per‑asset limits reduce impact of mistakes.

Operations

Incident response

Documented runbooks, on‑call rotations, and clear stakeholder comms.

Change management

Peer review, staged rollouts, and monitoring for safe releases.

DR & continuity

Disaster recovery plans and tested backups for business continuity.

Compliance & standards

Regulatory
KYC / AML
Privacy
GDPR
AppSec
OWASP
Controls
Best practices

Audits & transparency

Independent reviews

We engage third‑party reviews and embrace responsible disclosure. Contact security.

Operational transparency

Clear status updates, incident postmortems, and roadmap notes where applicable.

Quantum‑resistant overview

Post‑quantum outlook

We track PQC standards and design for forward‑compatibility.

Proven primitives

SHA‑256, ECDSA, and modern Bitcoin standards like SegWit & Lightning.

Learn more

See About and Features for a deeper breakdown.

Transparency & quick links
Whitepaper (PDF)Explorer

Security FAQ

Do you support 2FA?

Yes. Enable TOTP 2FA in Settings → Security. Store backup codes securely.

How are keys protected?

Keys are protected via HSM/MPC custody, strict access, and monitored operations.

Can I restrict withdrawals?

Yes. Use address allowlisting and per‑asset limits for extra protection.

Do you publish incidents?

We aim to communicate clearly via our Status page and postmortems where applicable.