Skip to main content
All CollectionsSecurity
How does Arch keep my Crypto secure?
How does Arch keep my Crypto secure?
Updated over a month ago

At Arch, the security of your crypto assets is our top priority. We have implemented industry-leading practices to ensure your assets are safe and protected at all times. Here’s how we do it:

1. Custody with Anchorage

We partner with Anchorage, a federally chartered U.S. bank and regulated, qualified custodian. Anchorage is one of the most secure and trusted platforms in the industry, offering bank-grade crypto custody solutions.

  • Key Management: Arch does not hold or manage any keys. All keys are securely managed by Anchorage, which provides the highest level of security available.

  • Bankruptcy-Remote Trusts: Assets held at Anchorage are secured in bankruptcy-remote trusts, ensuring they remain separate and protected.

  • Segregated wallets: For loans above $100k, we can provide you with a block explorer link to show your crypto is stored in a segregated wallet, ensuring full transparency over the location and status of your assets.

2. No Rehypothecation of Assets

At Arch, we ensure that your crypto assets remain fully under your control at all times. We do not engage in rehypothecation, meaning your assets are never traded, lent out, used as collateral, or otherwise utilized by third parties. This guarantees that your assets are always available to you and are solely managed with your interests in mind.

3. Insurance Against Loss and Theft

Our Anchorage accounts are insured against loss and theft, providing an added layer of protection and peace of mind for our customers.

4. Strict Internal Security Controls

As part of our practices at Anchorage, Arch employs a robust system to control access to assets:

  • Only select members of the Arch team are authorized to request asset transfers from our Anchorage accounts.

  • Each request requires multiple team members to provide approval, verified through video authentication, which is further validated by Anchorage.

5. Advanced Security Practices

Arch continuously tests its security infrastructure through:

  • Penetration Testing: We conduct extensive penetration testing to identify and resolve vulnerabilities before they can be exploited.

  • Bug Bounty Program: Our bug bounty program incentivizes security experts to find and report potential weaknesses, helping us maintain a strong infrastructure.

Did this answer your question?