Your security

Our priority

By partnering with industry leaders in custody, safety and insurance, Coinchange mitigates risk and keeps your investment secure.

$30,000,000

Insurance by fireblocks

Keys protected

by coincover

Audited by

by grant thornton

Industry-leading security
meets industry-leading  yield

Delivering an innovative opportunity to increase your wealth starts with gaining your trust. With that in mind, every decision at Coinchange is made with security, compliance and mitigation in mind.

We meet (and exceed) regulation standards in KYC and AML for our customers around the world.

From our strategic association with best-in-class partners, to our expert strategy and research team, to our talented developers – we are building a culture of compliance that delights in delivering high yields at low risk.

Biometric app security
Fraud prevention process
Robust risk-assessment
Algorithmic risk mitigation
Diverse team of cryptocurrency experts
Third-party vulnerability testing

$30 Million Insurance

Our Fireblocks coverage protects your investment from failures of our technology products or services which result in theft of cryptocurrency.

This covers events such as loss of data assets, cyber extortion, technology errors and technology products failure, malicious or criminal acts of employees, failure of any of our third-party providers and more.

Learn more about Fireblocks.

Secured Wallets and Keys

We use Coincover to provide government grade key storage – as well as the recovery of crypto funds in the event of a loss of access to keys.

This is military-level protection of keys that is trusted by government and law enforcement around the world.

Learn more about Coincover.

Fraud Prevention and AML Assurance

Coinchange uses Jumio as a solution for automated identity verification for KYC (know-your-customer). Jumio helps keep us secure from financial crime while also keeping the amount of friction for our clients low. Jumio is also trusted by Microsoft, Oracle, Monzo, and HSBC

In addition, we use KYC2020, Chainalysis, Plaid to adhere to the strictest Anti-Money Laundering (AML) global compliance standards.

Learn more about Jumio.

We partner with the best

Silvergate
Circle
Fireblocks
Jumio
Visa
Coincover
Chainalysis
Grant Thornton
Huobi Global
Kraken
Bittrex
Coinbase

How We Evaluate Protocols

Integrating new blockchains, protocols or strategies into Coinchange takes a dedicated team that follows a predefined framework. These research and the risk assessment procedures are key to making that integration as secure and smooth as possible.

Sector
Research

In this step we gather, analyze and synthesize intelligence about crypto projects and initiatives across the crypto asset ecosystem. We provide internal stakeholders with the knowledge and insights necessary to provide actionable insights. 

Protocol screening and risk evaluation

By building upon the content and information gathered in the previous step, we use specific criteria on a protocol or blockchain available information to uncover relevant info about risks; this includes information about the team and its vision, the protocol control, overall code quality and counterparty risk. The result is a relative risk understanding of the blockchain or protocol.

Strategy info for integration

Here we list any data point relevant for integration into the backend algorithm. We keep those data points up to date and add any new protocol data point into the current list once they successfully pass the “Protocol screening” evaluation and the “Strategy definition”.

How We Choose Protocols

Integrating new blockchains, protocols or strategies into Coinchange takes a dedicated team that follows a predefined framework. These research and the risk assessment procedures are key to making that integration as secure and smooth as possible.

How coinchange Chooses Protocols

Protocol Evaluation

Sector
Research

In this step we gather, analyze and synthesize intelligence about crypto projects and initiatives across the crypto asset ecosystem. We provide internal stakeholders with the knowledge and insights necessary to provide actionable insights. 

Protocol screening and risk evaluation

By building upon the content and information gathered in the previous step, we use specific criteria on a protocol or blockchain available information to uncover relevant info about risks; this includes information about the team and its vision, the protocol control, overall code quality and counterparty risk. The result is a relative risk understanding of the blockchain or protocol.

Strategy info for integration

Here we list any data point relevant for integration into the backend algorithm. We keep those data points up to date and add any new protocol data point into the current list once they successfully pass the “Protocol screening” evaluation and the “Strategy definition”.

Learn more about how we evaluate protocols.

How Coinchange Chooses Protocols

Strategy Definition

Creating Alpha

This section serves as the understanding of the delta that can be created to eventually be used in the High Yield Account. Our goal in this stage is to lay the foundation in terms of protocols with their associated low risk strategies across chains. To achieve this the strategies must be delta neutral (no exposure to market risk/volatility) or have no market risk, which leverage the composability of the protocol already in use and assessed. We also want to stay on top of any new farming opportunity, especially ones that are short lived and carry a higher risk/reward ratio thanks to the continuous flow of yield farms coming from multi-channel sources.

Strategies can be created or curated.

Created: Strategies can be created by using information from our Protocol Evaluation stage. This is done by our analyst and quant team that aim to re-use our tested and secure mechanisms already in production.

Curated: Strategies can be gathered from diverse protocols with multi-channel sourcing. We strip down the potential strategy to its core elements to highlight the basic framework in order for easy reproducibility across protocols.

How coinchange Chooses Protocols

Guideline and Allocation

Final Strategy Results and Risk Management

This section is the final part of the research process. It condenses the information from the protocol evaluation and strategy definition steps. It also adds elements of risk management to the strategies themselves together with guidelines and restrictions on AUM allocation to create diversification and highest risk to reward ratio.

Platform Security

2FA Authentication

SMS Verifications, Email Verifications, Authenticator App Support

Biometric Identification

Using Fingerprint or Face Recognition

24/7 Support

Excellent rated Customer Support available through chat or email

Platform Security

Testimonial Image

Automated Strategies

Our yields are the same or better than the current maximum earnings across DeFi protocols we're connected to.

Sam Kennedy

Marketing Lead, Twitter

DeFi Risks and How We Assess Them

Smart Contract Risk

• Code security score
• Audit & findings
• Bounty program
• Protocol type
• Verification of ownership
• And more

Learn more about Smart Contract Risk

Operational Risk

• Understand team and vision
• Counterparty
• Economic model
• Incentives
• And more

Learn more about Operational Risk

Liquidity and Financial Risk

• Composability
• TVL
• Asset used and risk
• Minimum liquidity
• Volume threshold requirement
• And more

Learn more about Liquidity Risk

Market Risk

• Asset used and risk
• Average APY
• Usage
• Ratio
• And more

Learn more about Market Risk

Custody Risk

• Cyber breach
• Failure in 3rd party
• Loss of data asset
• Malicious employees;
• Tech professional liability
• And more

Learn more about Custody Risk
Secure Identity Protection and Confidentiality

We use Secure Sockets Layer protection (SSL) to keep all user data encrypted – including sensitive credit information you supply.

User data is only accessible by a small number of Coinchange employees who manage identity verification and account safety.

Cloudflare & Amazon

We use Cloudflare and AWS to encrypt and secure passwords, APIs and our code.

These services also increase the speed and reliability of our products.

Learn more about Cloudflare
Start earning*
in 5 simple steps

*not just saving

Register

Web App, iOS and Android.

Verify yourself

To start using Coinchange

Buy or transfer digital assets

Transfer to High Yield Account to earn returns

Receive $40 free sign up bonus

Learn more