AES-256 ENCRYPTION

Secure software on desktop and mobile

The Wallet and Exchange both support 2FA, use AES-256 encryption, and private keys for custodied funds are stored in FIPS 140-2 certified devices Legacy Portfolio Management Limited enforces TLS 1.2 for Internet-facing applications and audits support cypher periodically Strong cyphers are used to enforce storage encryption across the cloud and physical facilities Bitcoin Code Icon

PRIVATE KEYS

The most-used cryptographic software in the world

Client-side private key management is not unique to Legacy Portfolio Management Limited, but at our scale is the most-used cryptographic tool in the hands of millions If you own your private keys, you own your crypto Zero knowledge proofs and private key management are the foundation of cryptocurrency Touch Id Lock Icon

PRIVACY AND TRUST

We help you keep your crypto and your data secure

We do not track non-custodial funds held in Private Key Wallets, we only keep track of funds in Accounts that are custodied by Legacy Portfolio Management Limited All Personally Identifiable Information is stored in Google Cloud Platform, secured by best in class digital security. Our compliance team ensures that we follow and are compliant with AML and KYC regulations globally so that you can trust Legacy Portfolio Management Limited and any counterparty Bug Bounty Logo Icon Bug bounty program

Secure your Legacy account

  • Choose a unique password
  • Enable two-factor authentication
  • Write down your Secret Private Key Recovery Phrase, store offline, and don't share it with anyone
  • Support Articles:
  • Swap - Exchanging Crypto
  • Wallet Functions & Security
  • Buying & Selling Crypto
  • Always follow security best practices

Keep your information private

  • Never give out your backup phrase, pairing code, or access to your Wallet
  • Protect your Secret Private Key Recovery Phrase
  • Physically write down and secure your passwords
  • Only reach out on verified channels
  • Twitter, Instagram, Medium
  • Bookmark our website
  • Avoid clicking on links or attachments in suspicious emails