B i t a r n o

Loading

shape
shape

Security

Standard security protocols

Industry leading protection for your crypto!

icon

Deep freeze storage

We store the majority of customer cryptocurrency in “deep freeze” using a multi signature wallet where the keys are generated and stored entirely offline and offsite.

icon

Hot wallet

A multi-signature hot wallet is used to facilitate instant Bitcoin transactions. Backups of the keys are stored offline in geographically dispersed safety deposit boxes.

thumb
shape
icon

Air Gaps

Private keys are stored offline, and offsite, on a machine not connected to the internet or other networks. This significantly reduces the attack surface since physical access is required.

icon

Social Share

There are many variations of passages of Lorem Ipsum

Your First Line of Defense (Authentication)


Bitarno protects your account with enterprise-grade authentication that's both powerful and easy to use.
Enable Two-Factor Authentication (2FA) to add a critical extra layer of security. Even if someone gets your password, they'll still need the unique code from your authenticator app to access your account.

We secure your password using military-grade hashing (bcrypt encryption) so no one - not even us - can ever see it. Our system automatically blocks brute force attacks and requires strong passwords to keep hackers out.
For ultimate convenience and security, log in instantly with biometric authentication (fingerprint or face ID) or use a hardware security key for phishing-proof protection.

Learn more about our security

  • Authorization

    Bitarno ensures that you authorize any High-risk actions that are performed on your account, such as sending crypto from your account..

  • Privacy

    Your personal and financial information is only stored and processed in cloud services that meet our strict infrastructure security requirements. This information is only collected and shared in accordance with our Privacy Policy.

  • Infrastructure

    Our infrastructure is hosted on Amazon Web Services, which offers a secure environment for Luno services to ensure the safest possible access control, data encryption, monitoring and isolation.

    Our internal networks are protected by firewalls and not exposed to the internet. All internet traffic is also encrypted to the same standard as external services. Our firewall policies are designed to allow minimum permissions for different applications and roles to interact.

    All application and database servers are running inside private networks, with isolation between staging and production environments. Public-facing services are made available by dedicated load balancers that only handle HTTPS requests.

  • Organization Security

    All Bitarno employees are required to use cryptographically-secure Multi-Factor Authentication such as hardware U2F keys to access internal services. Engineers do not have access to application credentials or production servers. All deployments are performed independently by a deployment server.

    As part of our hiring process, candidates must pass criminal background checks before becoming a Bitarno employee.

  • Communication

    We keep our members updated in real-time using our Status page, which has the current status of our services, details of any current incident, and information about upcoming scheduled maintenance.

  • Bug Bounty

    We work with an active community of security researchers through our Bug Bounty Program to continually improve the security of Bitarno and our members’ funds.