Risk warning: Cryptoassets are highly volatile and may lose value. Read full risk disclosure
Security

How we protect your account and your assets.

Security is layered: it starts with how we hold customer assets, runs through how we approve withdrawals, and ends at the controls you have on your own account.

Segregated customer wallets

Customer digital assets are held in custodial wallets segregated from operational treasury and identified to customer accounts in our books and records.

Cold storage majority

The majority of customer assets are held in offline cold storage with hardware-protected key material. A limited operating reserve is maintained online for processing transfers.

Multi-party approvals

Outbound transfers require multi-party approvals based on transaction size and risk. Out-of-band review applies to non-routine activity.

Multi-factor authentication

All customer accounts must enable multi-factor authentication. Authenticator apps and security keys are recommended over SMS.

Withdrawal address whitelisting

You can restrict outgoing transfers to a list of pre-approved blockchain addresses, with cool-down windows for newly added entries.

24/7 monitoring & alerts

Account activity is continuously monitored for unusual patterns. You receive notifications for sign-ins, address changes and outbound transfers.

Operational security practices

A

Hardware-backed key management

Cryptographic keys protecting customer custody are held in hardware modules with restricted physical and logical access. Key generation and use are audited.

B

Separation of duties

Engineering, operations and compliance functions are separated. No single individual can move customer assets without independent approvals.

C

Vendor and infrastructure due diligence

Critical service providers undergo security due diligence and contractual confidentiality, security and incident-notification obligations.

D

Incident response & notification

We maintain a documented incident response plan. We notify affected customers and applicable regulators in line with U.S. and state law.

E

Periodic independent testing

Our security and AML programs are subject to periodic independent review.

What you can do to stay safe

Responsible disclosure. If you believe you have found a security vulnerability, please email admin@springlightllc.com with the subject line "Security disclosure". Please do not test against live customer accounts.