Security Measures

1. Hardware Wallet

  • Our wallet system relies on the hardware security module (HSM) to ensure the confidentiality and security of private keys.

  • By implementing security protocols, including time-lock and multi-party approval(MPA), we ensure that all transactions require multiple verifications, preventing unauthorized access and unilateral operations.

2. Decentralized Verification

  • Acorn’s verification service consists of multiple validation nodes responsible for verifying and notarizing all transactions to ensure decentralization and security of transactions.

  • The signature process employs a decentralized verification mechanism, effectively preventing single-point failures and malicious behavior, ensuring the transparency and fairness of transactions.

3. Secure Key Management

  • Acorn's keys are managed and stored in secure hardware, significantly reducing the risk of key theft or leakage.

  • We conduct regular audits of the key management system to ensure its security and integrity, safeguarding funds.

4. Contract Security

  • Acorn conducts strict code audits of all smart contracts to ensure their security and reliability.

  • The smart contract module includes a blacklist function to prevent known malicious addresses from engaging in inappropriate operations.

  • The blacklist mechanism, combined with the multi-signature mechanism, ensures that any operation that may pose a security risk requires strict verification by multiple parties, further enhancing the platform's security.

Last updated