Platform Security

Last updated:

Data Encryption

All data is encrypted using AES-256 at rest and TLS 1.3 in transit

API Key Security

API keys are stored encrypted and never transmitted in plain text

Two-factor Authentication

Mandatory 2FA for all accounts with trading operations

Activity Monitoring

Continuous monitoring of suspicious activity and automatic notifications

Secure Infrastructure

Servers located in certified data centers with physical protection

Security Audit

Regular external security audits and penetration testing

1. Our Security Philosophy

Security is the highest priority for Nexopulse. We understand that our clients' trust depends directly on our ability to protect their assets and data. Our security strategy is multi-layered and covers both technical and organizational aspects.

2. Technical Security Measures

We use advanced methods and technologies to protect your information:

  • Data encryption: All confidential data, including API keys and personal information, is encrypted at rest and in transit.
  • Multi-factor authentication (MFA): We strongly recommend using MFA to protect your account from unauthorized access.
  • Isolated infrastructure: Our architecture prevents unauthorized access between different system components.
  • API key access limitation: API keys have access only to trading operations and cannot be used for withdrawals.
  • Regular security audits: We conduct continuous monitoring and auditing of our infrastructure to identify and eliminate vulnerabilities.

3. User Responsibility

  • Strong password: Use a complex and unique password.
  • Multi-factor authentication (MFA): Be sure to enable MFA.
  • API key security: Do not share your API keys with third parties.
  • Phishing: Beware of phishing attacks.

4. Security Recommendations

  • Unique passwords: Use unique passwords for each service.
  • Login notifications: Enable account login notifications.
  • Software updates: Regularly update your browser and operating system.
  • Wi-Fi: Do not use public Wi-Fi for trading operations.
  • URL verification: Check the site URL before entering data.
  • Antivirus: Use antivirus software.

5. Vulnerability Reporting

If you discover a potential vulnerability in our system, please report it to [email protected]. We value responsible disclosure and will review each report.

Important Warning:

Cryptocurrency trading involves high risks. Technical failures, cyber attacks or user errors may result in loss of funds. Use only funds whose loss you can afford. We are not responsible for losses arising for any reason.