We utilise physical, electronic, and procedural safeguards to protect your assets, identity, and personal information.
All customer assets are fully backed, securely custodied and independently verified by our audit partner — Mazars.
We operate in strict compliance with both local laws and global regulations.
We implement multiple layers of protection to ensure that we detect, prevent, and address any potential risks on our platform from all angles.
Your crypto that is held with us is collateralised 1:1 at all times. This is verified by our independent audit partner Mazars who publishes quarterly proof-of-reserve reports. These reports — together with our annual financial audits — provide third-party assurance that your funds and assets are fully accounted for.
Here are some of the examples of the best protections available to all our users
Add an extra layer of protection with Two-factor Authentication (2FA), generating a one-time code on your smartphone for complete peace of mind for sensitive transactions.
Passwords stored in Revix's database are irreversibly encrypted for security. We never store passwords in plain text, ensuring maximum protection for users. We require strong passwords and recommend reputable password managers for added security.
For all main security changes in your account settings, we will communicate with you and even give you the option of locking your account.
Revix mandates the use of cryptographically-secure Multi-Factor Authentication, such as hardware U2F keys, for all its employees to access internal services. The engineers are not granted access to application credentials or production servers, and all deployments are carried out by an independent deployment server. Prior to joining Revix, candidates are required to undergo a criminal background check as part of the hiring process.
Revix's infrastructure is hosted on Microsoft Azure, ensuring secure access control, data encryption, monitoring, and isolation. Our internal networks are protected by firewalls, with encrypted internet traffic and strict firewall policies for maximum security.
We monitor third-party data breaches and darknet markets for threats, automatically securing your login credentials to protect your account from potential risks.