Account Security Guide


Authentication Website

Please check the official websites carefully before you use it.Official Websites


Security Settings

API Security Guide

Bind Personal IP

IP binding can effectively prevent servers of non-registered IP from invoking permission to conduct transactions and other operations.

Do not use third-party platform authorization binding.

Do not use third-party platform authorization binding.

Do not leak your secret key.

The disclosure of the secret key may cause a third party to operate the account to buy in high price and sell in low price, which will result in the loss of assets

Virus Prevention

Do not use the public networks.

The public network security is relatively low that hackers may be able to easily steal your personal information.

Do not use public computers, mobile phones and other shared equipment.

Do not login to your account on public computers or other personal mobile devices.

Do not click unknown links and do not download apps from unknown sources.

Before trading, please make sure that there are no strangers around you. Please log out your account before you turn off the computer.


Phishing attack is a criminal fraud process that ultimately swindles sensitive personal information such as passwords, funds and verification codes by pretending to be the official website, official customer support or other official members.

Pay attention to the counterfeit official messages in your mail or text message.

Do not trust or participate in any non-official activity on the community.

Do not leak passwords, verification codes or other personal information. will only publish the platform related information on the official website and official communities. Do not trust any non-official information on the other communities.
Do not use your account information or deposit funds through unofficial websites, otherwise it could cause you fund losses due to phishing websites stealing your personal information.

Offline Storage

24-hour top security team on duty and strict security process control have made us safely and steadily operating since 2013.

More than 80% of the user's funds are offline stored and the funds are physically isolated from the network, which greatly improves the security level of user funds.

Sensitive data is encrypted by splitting redundancy, which is encrypted by AES-256, and stored independently from the server.

Install security alert system and real-time monitoring system in your server and establish a high level of server security protection can effectively prevent the serious consequences caused by the extreme attacks.


Please contact the official website’s online customer service if you have any question.