佈局
經典的
全屏
先進的
舊佈局

安全政策

 

Privacy policy

Security of assets and user data stored on the website is our first priority.
To increase security, the service constantly adds new levels of protection, improves audit processes and reduces the “attack surface” in its infrastructure. Within the frame of the intellectual property security and protection, we cannot disclose all the information about the protective measures used on our platform.

 

User account protection

Not all of the security measures described below are activated in the default mode, but you can activate them by yourself in the / security section, depending on the required level of security. There you can check the security status of your account and see recommendations for its protection.

 

Two-factor authentication (2FA)

This level of security is used to secure the most important operations conducted in your account, such as authorization, creating API keys and withdrawal of funds. You can control two-factor authentication using Google Authenticator, Twilio, or U2F security key.

 

Advanced verification tools for control of account integrity

All authorization data is stored and verified for suspicious activity.
The intelligent system tracks IP address changes to avoid hacking during a working session.

Notifications with authorization reports and a link to a quick account freeze in case of suspicious activity are received at the specified e-mail inbox.

 

Withdrawal protection

The security system automatically tracks withdrawal operations using  IP address and other patterns of user actions, and initiates a manual check of administrator in case it detects suspicious withdrawals.
Confirmation procedure of funds withdrawal is resistant to malicious modules in the browser.
Adding addresses to the white list of addresses will prevent the withdrawal of funds to third-party resources.
 

 

Cryptocurrency repository

Majority of digital assets in the system are stored in stand-alone “cold” wallets. Only about 0.5% of the cryptoactives are in “hot” wallets for use in everyday operations. To ensure a high level of security, you cannot get an access to the “cold” wallets from the platform itself and its servers. The right to manual access to the funds in the autonomous “cold” wallets is only granted to a few chief administrators.
 

 

System security

To host the platform, we use the latest Linux systems.
We use the best computer security practices and protect our servers with the latest software.
The database is automatically backed up once a day.
Once a day, a backup copy of the trading platform database is created, after that it is encrypted and archived.

 

Automatic duplicate of backup data

The created backup copy (database, log files, etc.) is immediately sent to several remote from each other physical servers.
 

 

DDoS-attacks protection

We use automatic protection against service denial kinds of distributed attacks, so that external attacks cannot affect the course of trading.

 

 

Home
市场
錢包
icon menu
現貨交易
用自己的資金工作
icon menu
模擬交易
無風險交易
icon menu
快速兌換
簡單直觀的界面
選擇你的語言
lang-icon lang-icon
right arrow

在社交媒體上關注我們,了解我們的最新進展

關於我們

關於 隱私政策 消息

服務

費用 交易规则 在線狀態 Dex-Trade Utility Token 錦標賽 验证我的经理

支持

常問問題 提交申請 經理個人資料 漏洞賞金 API文檔

© 2017-2025 Dex-Trade.com. 版權所有

安全 | 使用條款 | AML&KYC政策 | 風險披露聲明