🌐 Official Exchange  â†’  catcrs.com
Security Architecture

Security First

We place security before expansion. Our multi-layered architecture combines hardware security modules, cold/hot wallet separation, multi-signature schemes, and behavioral monitoring to protect user assets at every level.

01 — Wallet & Custody

Tiered Wallet Architecture

Assets are protected through a combination of hot/cold separation, HSM key management, and threshold multi-signature schemes. Large institutional operations progressively incorporate MPC enhancement.

🧊

Cold / Hot Separation

The majority of user assets are held in cold storage, physically isolated from internet-connected systems. Only a carefully managed portion remains in hot wallets for operational liquidity.

🔑

HSM Key Custody

Hardware Security Modules are used for cryptographic key storage and signing operations, providing tamper-evident protection that prevents unauthorized access even under physical compromise.

âœī¸

Multi-Signature / Threshold

Critical transactions require multiple independent cryptographic signatures. Threshold signature schemes eliminate single points of failure in key management and signing operations.

MPC — Multi-Party Computation Enhancement

For institutions and large-scale operations, we are progressively introducing MPC-based solutions. MPC enables dynamic threshold adjustments without rebuilding addresses, reduces single-point risk, and optimizes on-chain costs. Adoption in institutional custody has been growing year over year as the industry matures toward decentralized key management.

MPC Threshold Signing No Single Point of Failure Dynamic Threshold Adjustment On-Chain Cost Optimized

02 — Matching Engine

Self-Developed Low-Latency Engine

Our proprietary matching engine is built on order sequence consistency as its foundational constraint, with redundancy and failover at every critical node.


03 — Account Security

Default-Secure Account Configuration

Every account is protected by a layered set of security defaults — mandatory for all users, with additional controls available for institutions and high-value accounts.

🔐

Mandatory 2FA

Two-factor authentication is required for all accounts without exception. Users may not disable 2FA once enabled, ensuring a consistent security baseline across the platform.

📱

Device Trust Management

Unknown devices trigger verification flows and remote login alerts. Device trust lists are maintained per account, with immediate notification of unrecognized access attempts.

🚨

Withdrawal Controls

Large withdrawals trigger behavioral scoring and time delays before execution. Withdrawal whitelists and address verification ensure funds only move to confirmed destinations.

🧠

Behavioral Detection

Abnormal login and withdrawal behavior triggers interception and secondary confirmation. "Silent success" is never prioritized over user protection during login or transaction flows.

âąī¸

Large-Amount Delays

Withdrawals above configurable thresholds are subject to time-locked delays, linked to behavioral scoring. This provides a recovery window in the event of account compromise.

📡

Scam & Phishing Education

Anti-fraud education is integrated into the registration flow. Users learn to identify official vs. counterfeit channels before completing their first transaction.


04 — Proof of Reserves

Verifiable Asset Proof (PoR)

We are building toward a transparent, verifiable proof-of-reserves framework — based on Merkle tree snapshots and third-party method reviews, with a roadmap toward zero-knowledge proof integration.

  • đŸŒŗ
    Merkle Tree Snapshots Current PoR is based on Merkle tree asset snapshots, allowing users to verify inclusion of their balance without exposing other users' data.
  • 🔍
    Third-Party Method Review Our PoR methodology is reviewed by independent third parties to validate correctness of the approach, not just the result.
  • 🔒
    Zero-Knowledge Proof Roadmap We are monitoring industry adoption of zk-SNARK/zk-STARK for PoR, with interfaces reserved in our technical architecture for future integration.

Important Scope Note

Proof-of-Reserves is a verifiable snapshot demonstrating that on-chain assets meet or exceed user liability balances at a given point in time. PoR is not a substitute for a full financial audit. We are transparent about this boundary in all our disclosures — our goal is to provide verifiable trust, not misleading certainty.

Internal PoR Trial: Oct 2025 Regularized Disclosure: Planned

05 — Resilience & Observability

End-to-End Monitoring & Disaster Recovery

We maintain constant observability across all systems and conduct regular exercises to ensure recovery capabilities are real, not theoretical.

📉

Capacity Stress Testing

Regular load and stress tests are conducted against production-equivalent environments to identify bottlenecks before they become incidents.

🌍

Multi-Region Disaster Recovery

Multi-region failover drills are conducted routinely (normalized since May 2024). Rollback processes are fully standardized and regularly rehearsed.

đŸ“ĸ

Public Status Page

Key events and timelines are disclosed on our status page using standardized templates. Root cause summaries are published after major incidents so external parties can evaluate our response.