Custody Structure

Cold Storage & Operational Wallets

Cold Storage

The majority of digital assets are maintained in offline storage environments designed to reduce exposure to online threats.

Cold storage measures include:

  • Multi-signature authorization controls
  • Restricted internal access permissions
  • Segregated storage environments
  • Controlled withdrawal authorization procedures
Cold storage is not directly connected to public networks.

Operational (Hot) Wallets

A limited portion of assets is maintained in online wallets to support routine withdrawals and platform operations.

Operational wallets are subject to:

  • Access control policies
  • Continuous monitoring
  • Withdrawal limit controls
  • Internal authorization procedures
Hot wallet exposure is minimized as part of our risk management framework.
Withdrawal Security

Withdrawal Authorization Controls

Withdrawals undergo layered verification designed to protect user accounts:

1
User authentication including 2FA where enabled
2
System-based limit and risk checks
3
Email confirmation where applicable
4
Address validation controls
5
Additional compliance review for flagged transactions
High-value withdrawals may require enhanced internal authorization.

Processing times may vary depending on network conditions and compliance review requirements.

Address Whitelisting

Users may enable withdrawal address controls to enhance account security.

Security measures for address updates may include:

  • Verification requirements
  • Temporary activation delay
  • Additional confirmation procedures
These controls are designed to reduce unauthorized withdrawal risk.
Configure Address Whitelisting
Incident Response

Security Monitoring & Incident Response

DEGX maintains internal monitoring systems to detect unusual account activity, withdrawal behavior, or potential abuse.

In the event of suspected security concerns, the following steps may occur:

Detection Activity flagged by monitoring systems
Containment Temporary account restriction where appropriate
Investigation Internal compliance and technical review
User Communication Notification where necessary
Remediation Additional verification before access restoration
Control Enhancement Review and improvement of procedures

Continuous Monitoring

24/7 surveillance of platform activity and withdrawal patterns

Automated Alerts

Real-time flagging of suspicious activity

Continuous Improvement

We continuously review and strengthen our security framework as part of our operational development.

Layered Security Approach

Our custody controls combine technical safeguards with procedural checks to protect user assets at every stage.