- User personal identity verification: OTP or bio-information verification are required for users in critical operations such as changing transaction passwords and forgetting passwords;
- Information collection: We follow a minimal data collection strategy, and in any data collection scenario, we always seek your authorization;
- Data transmission: Data transmission is encrypted using the TLS (Transport Layer Security) protocol to ensure confidentiality and integrity during the transmission process.
- Data signature: all interface interactions employ a signature mechanism to ensure that data is protected from tampering;
- Storage encryption protection: Sensitive data is encrypted using the AES 256 encryption algorithm to ensure confidentiality during the storage process;
- Data disaster recovery: multi-node data redundancy backup strategy is adopted to replicate customer data to multiple nodes and storage devices to ensure data availability and disaster tolerance;
- Data Recovery Plan: We simulate various data disaster scenarios, develop recovery strategies, and conduct regular drills;
- Data accessibility control: We have strict policies and systems in place to control data access and usage, ensuring the principle of minimal data access and usage;
- Please refer to our
Privacy policy for more information.