Security
Capital evaluation requires trust. Trust requires transparency. Here is what we do and how we protect what you send us.
EncryptionAES-256 at rest, TLS 1.3 in transit. Your data is encrypted before we judge it.
AuthenticationAPI keys with scoped permissions. OAuth 2.0 for enterprise. No shared secrets.
InfrastructureSOC 2 Type II compliant infrastructure. Multi-region redundancy. Zero-trust architecture.
Data RetentionTrade data purged after 90 days unless retention is explicitly requested. We don’t want your history.
Penetration TestingAnnual third-party pentests. Continuous automated vulnerability scanning. Bug bounty program.
ComplianceGDPR-ready. CCPA-ready. We comply with regulations the same way the engine evaluates trades: structurally.