Security

Up-to-date servers

We keep the server’s operating system and applications up to date with the latest security patches.

Firewall

Configuring the firewall to allow only necessary ports and protocols and blocking all others.

Authorized access

Restricting access to the server to only authorized personnel, using methods such as SSH keys or two-factor authentication and on some services we use ip-restricted access.

Prometheus and Grafana

Monitoring the servers and nodes for unusual activity with prometheus and grafana monitoring and alerting systems.

Backup servers

Backup servers/redundant services are running so we can recover nodes in the event of a hardware failure.

Customized servers

Our servers are not located at crowded places where the costs are lower to host blockchains. In order minimize risk of downtime for the networks we handpick the servers we use with different datacenters and online providers.

Contact us

In the case you have any questions or concerns about our security practices, please contact us at [email protected] or check out our contact page for more details on how to get in touch with us.

Last Updated: