Security Measures in a Crypto-Enabled Environment

We implement commercially reasonable security measures to protect the data associated with user interactions on our platform, even when such data is pseudonymous and not classified as personally identifiable information (PII). These protections are tailored for decentralized, blockchain-based ecosystems where wallet addresses, smart contract interactions, and gameplay metadata may still pose privacy considerations. Our security framework includes:
● Encryption of Web Traffic using HTTPS and TLS protocols to ensure secure transmission of data. ● No Custody of Private Keys: Users retain sole control of their wallets. We do not store, manage, or access any private keys or seed phrases. ● Backend Access Controls: Access to infrastructure that processes or logs blockchain interactions is tightly restricted and audited. ● Regular Audits: We conduct internal reviews of our infrastructure and rely on third-party audit services where applicable, especially for smart contracts that interact with user wallets. ● Minimal Data Retention by Design: Our architecture is built around minimizing data collection and retention to reduce the risk of breach or misuse. ● Anomaly Detection: We monitor for suspicious or potentially fraudulent activities on-chain and off-chain to protect user experiences and ecosystem health.
Despite our best efforts, we remind users that blockchain systems come with inherent risks. Transactions are irreversible and wallet activity is public. Users should exercise caution and follow best security practices, including keeping their wallet credentials secure and avoiding phishing attempts. If you believe your interaction with our platform has been compromised, please contact us immediately through the "Contact Information" section.
Last updated