7.4 Data Security and Privacy
Fexse uses advanced cryptography methods to secure user data and all transactions performed on the platform.
The platform applies industry-standard encryption protocols to protect traders' personal data, assets and trading history from unauthorized access.
User Security: Each user who logs into the platform can only access their own information and only authorized users can perform transactions.
Token and Revenue Transfer Security:
All token transfers,
Distribution of rental income and other asset income,
FEXSE and NFT Token transactions,
is protected by cryptography-based security protocols.
Data Privacy: User data may only be shared under legal obligations and under the conditions specified in the relevant technical documentation.
a) Industry Standard Encryption
User data and all transactions are protected by highly secure encryption algorithms such as AES-256 and RSA-2048.
These encryption methods are applied both during storage and transmission of data.
b) Advanced Cybersecurity Monitoring
Anomaly Detection: Anomalous behaviors are monitored in real time with AI and machine learning based tools.
Threat Intelligence: Integration with global threat intelligence networks allows new threats to be identified and blocked instantly.
Real-Time Alerts: Users are instantly notified when potential security risks occur and additional security measures are recommended.
c) Protection Against Attacks
DDoS Protection: Distributed denial of service attacks are blocked using advanced Web Application Firewall (WAF) and network-level defenses.
Intrusion Detection (IDS/IPS): The data flow of the platform is continuously monitored, unauthorized access attempts are detected and blocked.
Blockchain Security: Additional defense mechanisms have been put in place against threats to blockchain security such as 51% attacks.
d) Regular Safety Inspections
Independent Cyber Security Audits: Penetration tests are conducted at least twice a year and smart contracts and API security are audited.
Standard Compliance: Security controls in accordance with OWASP (Open Web Application Security Project) standards are applied.
Last updated
Was this helpful?