Security Protocols

Cryptography: We use Elliptic Curve Cryptography (ECC) with the secp256k1 curve for public-private key generation, ensuring robust security for our users’ transactions.

Smart Contract Audits: Regular audits are conducted by third-party firms to ensure the integrity and security of our smart contracts.

Last updated