Information Security Measures

Authentication

Robust identity management remains the primary defense against unauthorized access to derivative trading accounts and liquidity pools. Multi-factor verification protocols significantly reduce the probability of account takeover, which is essential when managing high-leverage positions or significant collateral balances. Cryptographic hardware keys provide a superior layer of protection by requiring physical possession to authorize sensitive transactions or protocol governance changes.