Security Protocols
Cryptography: We use Elliptic Curve Cryptography (ECC) with the secp256k1 curve for public-private key generation, ensuring robust security for our users’ transactions.
Smart Contract Audits: Regular audits are conducted by third-party firms to ensure the integrity and security of our smart contracts.
Last updated