Hot wallet
A multi-signature hot wallet is used to facilitate instant Bitcoin transactions. Backups of the keys are stored offline in geographically dispersed safety deposit boxes.
Loading
We store the majority of customer cryptocurrency in “deep freeze” using a multi signature wallet where the keys are generated and stored entirely offline and offsite.
A multi-signature hot wallet is used to facilitate instant Bitcoin transactions. Backups of the keys are stored offline in geographically dispersed safety deposit boxes.
Private keys are stored offline, and offsite, on a machine not connected to the internet or other networks. This significantly reduces the attack surface since physical access is required.
There are many variations of passages of Lorem Ipsum
Bitarno protects your account with enterprise-grade authentication that's both powerful and easy to use.
Enable Two-Factor Authentication (2FA) to add a critical extra layer of security. Even if someone gets your password, they'll still need the unique code from your authenticator app to access your account.
We secure your password using military-grade hashing (bcrypt encryption) so no one - not even us - can ever see it. Our system automatically blocks brute force attacks and requires strong passwords to keep hackers out.
For ultimate convenience and security, log in instantly with biometric authentication (fingerprint or face ID) or use a hardware security key for phishing-proof protection.
Bitarno ensures that you authorize any High-risk actions that are performed on your account, such as sending crypto from your account..
Your personal and financial information is only stored and processed in cloud services that meet our strict infrastructure security requirements. This information is only collected and shared in accordance with our Privacy Policy.
Our infrastructure is hosted on Amazon Web Services, which offers a secure environment for Luno services to ensure the safest possible access control, data encryption, monitoring and isolation.
Our internal networks are protected by firewalls and not exposed to the internet. All internet traffic is also encrypted to the same standard as external services. Our firewall policies are designed to allow minimum permissions for different applications and roles to interact.
All application and database servers are running inside private networks, with isolation between staging and production environments. Public-facing services are made available by dedicated load balancers that only handle HTTPS requests.
All Bitarno employees are required to use cryptographically-secure Multi-Factor Authentication such as hardware U2F keys to access internal services. Engineers do not have access to application credentials or production servers. All deployments are performed independently by a deployment server.
As part of our hiring process, candidates must pass criminal background checks before becoming a Bitarno employee.
We keep our members updated in real-time using our Status page, which has the current status of our services, details of any current incident, and information about upcoming scheduled maintenance.
We work with an active community of security researchers through our Bug Bounty Program to continually improve the security of Bitarno and our members’ funds.