SAFETY

SSH - key

The technology is based on a pair of cryptographic keys that are used to verify authenticity as an alternative to authentication using a password. The entrance system uses closed and open keys that create before authentication. The closed key is kept secret by a reliable user, while the open key can be distributed from any SSH server that you need to connect.

Firewall

The firewall is part of the software or software and hardware that filters network traffic and controls access to the network. This means blocking or restricting access to each open port, except for exceptions.

PKI and SSL/TLS

Open Keys Infrastructure (PKI) - a set of systems that are designed to create, control and check certificates for identifying persons and encryption of the transmitted data. After authentication, they can also be used for encrypted communication.

Isolated implementation environment

By dividing the processes into separate environments, we increase the ability to quickly isolate any possible threats. Like the compartments in ships that restrain the holes in the body and do not allow the vessel to drown, the separated components of server infrastructure will help cut off the cracker access to other parts of the system.

A detailed response from the head of the company's security service.

RSTAKING is considered one of the safest blockchain companies in the world today. We have created an autonomous and secure project that can continue to operate even in the event of a total worldwide blackout. Every day laws are passed to regulate blockchain companies, thereby jeopardizing the peace of mind of citizens who own crypto-assets. We are a decentralized company that will preserve its users' funds and data, regardless of locks or political factors aimed at total control of its citizens and their assets.

RSTAKING does not verify its users or set withdrawal limits. 24 words of access recovery, 50 ultra-secure domains with recovery feature (-1+3), no KYC, stable servers all over the world and safety of users' crypto-assets. When registering, users only provide their email address to receive messages from RSTAKING. If you cut off 1 head, new 3 will grow.

–Lee Kohn

Last updated