How are token holders protected ?
In addition to the security inherent in a blockchain based ledger for transactions provided by securing the records through cryptography, interlinking of the records and distributed copies of the ledger, we also intend to take explicit steps at the peripheral level by
- Preventing anyone — even root users and administrators — from accessing sensitive information
- Track and deny unauthorized attempts to modify data or applications in the network.
- Securely guard encryption keys using highest-grade security standards so that breaches do not occur.