6 Ways we keep you secure
Cold Wallets
~98% of cryptos stored with CredibleBit are in cold wallets
that are signed using HSM on air gapped machines located in different cities and countries
~98% of cryptos stored with CredibleBit are
in cold wallets that are signed using HSM on air gapped machines located in different cities and
countries
Strong Internal Controls
Our infrastructure is secured behind strong firewalls & no
external party can access our infrastructure, neither can any service provider (eg: an ISP)
interfere with our product development process. Our employees undergo thorough background
verification and are given bucketed network access based on their roles
Our infrastructure is secured behind strong
firewalls & no external party can access our infrastructure, neither can any service provider
(eg: an ISP) interfere with our product development process. Our employees undergo thorough
background verification and are given bucketed network access based on their roles
Protect Transactions with Omnitrixx
CredibleBit’s proprietary security protocol & platform,
Omnitrixx, enables a world-class multi-chain security system protects all transactions between
cold and hot storage wallets
CredibleBit’s proprietary security protocol
& platform, Omnitrixx, enables a world-class multi-chain security system protects all
transactions between cold and hot storage wallets
Constant Third-party Testing
Our products & platform are constantly tested by security
experts both inside and outside CredibleBit
Our products & platform are constantly tested
by security experts both inside and outside CredibleBit
Built in Redundancies
Coins stored with us cannot be breached or accessed from a single
geographic location or by a single person. Apart from the cold storage, all hot wallet
transactions on CredibleBit are signed using systems across different cloud platforms. At
every step of our security practice, we avoid any single point of failure
Coins stored with us cannot be breached or
accessed from a single geographic location or by a single person. Apart from the cold storage, all
hot wallet transactions on CredibleBit are signed using systems across different cloud
platforms. At every step of our security practice, we avoid any single point of failure
Get Rewarded for Finding Flaws
CredibleBit encourages and rewards security researchers to
test our security. We offer a bug bounty program for the community to find issues that may put
our customers at risk
CredibleBit encourages and rewards security
researchers to test our security. We offer a bug bounty program for the community to find issues
that may put our customers at risk
Fully Compliant and Adhering
to
Regulations
We have relentless pursuit of absolute security and flawless compliance towards all regulations.
- ISO 27001:2013 certification for ISMS – Information Security Management System.
- Members of IAMAI & BACC in India.
- Members of ADCA and are AUSTRAC compliant
- GDPR compliance and continue to maintain the highest standards of security to ensure safety and integrity of data
- Members of the Bitcoin Association Switzerland and of the Switzerland based Crypto Valley Association