16. Security

Security will be provided through various methods, but to protect crypto assets, a solution like the one shown in the diagram below is used.

Most crypto assets are managed in cold wallets. Only the necessary amount of crypto assets for operations is moved from cold wallets to hot wallets, and these transferred assets are used in off-chain content through the asset managing web.

Last updated