Safety and protection of e-Wallet

Keeping your e-Wallet secure is our top priority. Use two-factor authentication, strong passwords, and follow our recommendations to ensure maximum protection of your financial data and prevent fraud.

Google Play
phone

Safety features

key
Independent Security Audits

We conduct regular independent security audits to ensure the protection of your assets. This helps identify and eliminate potential vulnerabilities.

key
Enhanced Secure Wallet Generation with Graphical Key

Our wallet generation method guarantees the highest level of security for your funds. The graphical key adds an extra layer of protection.

key
Increased Confidentiality / Anonymity

Your transactions and data will always be protected and remain confidential. We ensure a high level of anonymity for all users.

key
Safety updates

Regular updates to ensure maximum protection of your funds and data. We continuously improve our security systems to counter new threats.

key
Personal Data Protection

Your personal and financial data is securely protected using modern encryption methods. This ensures your information remains confidential and inaccessible to attackers.

key
Two-Factor Authentication

An additional layer of protection that prevents unauthorized access to your wallet. Use a secret code or biometric data for authentication.

orangeBG
icons

We use advanced security methods to ensure maximum protection of your data.

Trusted node

Ensures maximum security and trust in your transactions.

Cold staking

Allows you to earn on your cryptocurrencies by storing them in secure cold wallets.

Identification based on blockchain

Provides a high level of protection and user authentication.

Maximum security of your assets

We do not store private keys on our servers or on the phone

Instead, it's a mnemonic code. To generate Hash Store using a salt and password that only you know. These data never leave the device and are not transmitted over the network, ensuring better security.

Hardware encryption and biometric identification

This provides an additional level of protection, helping to prevent unauthorized access to keys.

Mnemonic phrase for authorization, known only to you

It consists of 12 words, uses a dictionary of 2048 words, and for example, for 12 words, there are 2048^12 (or approximately 5.44 * 10^39) possible combinations. The number of mnemonic phrase variations exceeds the number of atoms in the Universe.

FAQ about safety

How can I ensure that my personal data is secure?

Why aren't private keys stored on servers and phones?

What should I do if I lose the device with the E-wallet installed?

How often are independent security audits conducted?

screenshots app