Page cover

Security

XIO employs a multi-layered security architecture to protect user data and assets. By integrating advanced technologies, XIO ensures secure transactions, privacy, and protection from external threats.

Decentralized Identifiers (DIDs) & Verifiable Credentials (VCs)

XIO creates privacy-preserving identities with DIDs and VCs, streamlining KYC processes and minimizing user friction.

Click to view more
  • Decentralized Identity: DIDs remove the need for repeated authentication.

  • Streamlined KYC: Accounts remain unverified until KYC is completed for security.

  • Privacy First: Secure, decentralized structure for user identity management.


Multi-Device Authentication (XIO Component Access - XCA)

Link DIDs to multiple devices for seamless and secure account management.

Click to view more
  • Device Sync: Preferences and customizations are synced across devices.

  • Simple Authentication: Uses 2FA or FaceID for secure access on multiple devices.


End-to-End Encryption

XIO ensures all sensitive communications are encrypted, both in-transit and on-device.

Click to view more
  • Encryption: Communications involving value transfers and sensitive data are encrypted.

  • Privacy: Protects against data breaches and ensures privacy across the platform.


Air-Gap Wallet Security

A cold-to-hot air-gap mechanism secures fund transfers between offline and online wallets.

Click to view more
  • Cold-to-Hot Security: Transfers between cold and hot wallets are protected.

  • Zero Knowledge Proofs: Prevents exposure of sensitive information during transactions.


Trusted Group Collaboration

Utilizing DIDs and VCs, users can form secure, trusted groups for collaborative trading and alerts.

Click to view more
  • Secure Collaboration: Trusted groups for safe and transparent trading and alerts.

  • VC-Based Onboarding: Ensures authenticity and security in group interactions.


Additional Features

Click to view more
  • Internal VM for Smart Contracts: Handles secure execution of encrypted smart contracts.

  • In-Transit Data Encryption: Ensures transaction and account data is always encrypted.

  • Compliance with Global Standards: Built to meet global regulatory requirements, with modular policies.

Last updated