@@%BRANCH%@@
Help Center

Bitop Introduction

01 Jan 2024
Provide the industry's top safety guarantee for global customers

Bitop is committed to implementing rigorous, precise, and comprehensive security standards to ensure that the industry’s most stringent security measures and tools are used to achieve multiple operations in trading systems, network transmissions, customer accounts, fund custody, insurance, and auditing. Prevent customer assets from encountering any accidents and threats at all levels. The platform regularly conducts stress tests and security audits to ensure compliance with the most stringent security standards and provide global customers with the industry’s top security guarantee.

Account Security

Two-factor authentication (provided by Google Authenticator) is also called two-step verification. It requires users to verify their identity in two different ways, which is more secure than traditional one-step verification (password protection) Security, which can prevent unauthorized users from accessing the account, which is more secure and reliable than SMS verification.

Wallet Security

Your digital assets are stored in our offline deep cold storage wallet, there is no single point of failure of the layered deterministic cold wallet, the risk of all leaks. In addition, we also use multi-signature technology for unprecedented access Deposits and withdrawals can defend against attacks and loss of keys or access to facilities. Even in the most extreme cases, the system is completely hacked by hackers, including web servers, transaction engines, and databases, due to any cloud server There is no private key on the website, and the hacker does not have enough keys to steal funds.

Engine Security

Our transaction matching engine uses kdb+ language programming, which is a tool set frequently used by major financial institutions in high-frequency trading programs. All subsystems of the transaction matching engine are optimized for secondary optimization using unique codes , And adopts advanced distributed cluster architecture and micro-service development methods to minimize delays and increase order execution speed. It can support more than 1 million concurrent transactions per second, achieving unprecedented speed and reliability. Our transaction matching The engine has the highest industry standard in the field of blockchain asset online trading, and is the most advanced, efficient and stable transaction matching engine on the market.

System Security

We use Amazon Web Services (Amazon Web Services) first-class security service that has a good reputation in physical security and internal control. The system requires multi-factor authentication and hardware verification to access. The hardware security module complies with the 'Encryption Module Security requirements' (FIPS PUB 140-2) The highest security level requirements above level three, we use encrypted SSL protocol to encrypt and protect website traffic, all passwords and sensitive data are 512-bit encrypted hash processing (SHA512), and use Cloudfare to Reduce potential DDoS attacks. The platform technical team regularly tests and checks, conducts IT security audits and assessments, and can discover new potential vulnerabilities at any time.