Security
Your security is our top priority. Learn about the measures we take to protect your assets.
- Regular penetration testing by independent security firms
- Continuous monitoring of systems for suspicious activity
- Strict access controls and authentication procedures
- Employee security training and background checks
- Incident response procedures and disaster recovery plans
- Compliance with international security standards
We encourage security researchers to help us improve our security by reporting vulnerabilities responsibly.
If you discover a security issue, please report it to our team through our responsible disclosure program. We ask that you:
- Give us reasonable time to address the issue before public disclosure
- Do not exploit the vulnerability beyond what is necessary to demonstrate it
- Do not access or modify other users' data
- Do not disrupt our services or systems
We regularly engage independent security firms to conduct comprehensive audits of our systems and protocols. These audits help us identify potential vulnerabilities and ensure we maintain the highest security standards.
Our most recent audit was conducted by SecureChain Labs in March 2025. The audit covered our core mixing protocol, infrastructure security, and compliance with industry standards.
We publish summaries of our security audits to maintain transparency with our users. Full audit reports are available to enterprise clients upon request.
