Skip to main content

Security & Disclosure

Last updated: December 2024

Security Overview

Hi-G takes security seriously. Our platform is built with security-first principles to protect user funds, data, and privacy.

Non-Custodial Architecture

Our non-custodial design means:

  • Users maintain full control of their private keys
  • Hi-G cannot access user funds
  • Wallet data is encrypted and stored locally
  • Multi-signature contracts for treasury operations

Technical Security Measures

Encryption

All sensitive data is encrypted both in transit and at rest using industry-standard encryption protocols.

Authentication

We implement multi-factor authentication and secure session management to protect user accounts.

Infrastructure Security

Our infrastructure includes:

  • Regular security audits and penetration testing
  • Automated vulnerability scanning
  • Secure development practices
  • Incident response procedures

Bug Bounty Program

We maintain an active bug bounty program to encourage responsible disclosure of security vulnerabilities. Security researchers can report issues through our designated channels.

Compliance

Hi-G complies with relevant security standards and regulations, including:

  • Data protection regulations (GDPR, CCPA)
  • Financial services compliance requirements
  • Industry security standards

Incident Response

In the event of a security incident, we have established procedures for:

  • Immediate containment and assessment
  • User notification when required
  • Regulatory reporting as necessary
  • Post-incident analysis and improvements

Responsible Disclosure

If you discover a security vulnerability, please report it responsibly through our security contact channels. We commit to acknowledging reports promptly and working with researchers to address issues.