Loading...
Please Wait...

Two-Factor Authentication Powered by Authy

Two-Factor Authentication (2FA) is an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are. First, you will enter your email and a password, and then instead of immediately gaining access to your account, you will be required to provide a code. This “second factor” code is a unique one-time passcode (OTP). The code can be sent either by SMS Text-Message, Voice-based 2FA, or by an Authy App Token on iOS or Android.

itrust
Everybody Should Use 2FA
Everybody Should Use 2FA
itrust
iTrust Security Overview

Keeping your assets safe.

iTrust implements security procedures so that no person or piece of software can make a transaction on its own. We set up multiple layers of security; for example, by locking down transfers to only our liquidity providers to ensure assets can't leave our ecosystem.

iTrust Security Overview

Curv Receives SOC 2 Status

Curv has received (SOC 2) Type II status following the completion of an independent audit of its service. Curv is the first and only Multi-Party Computation (MPC) digital asset wallet solution to achieve SOC 2 Type II status. The audit was conducted by EY Israel in compliance with the attestation standards set by the American Institute of Certified Public Accountants (AICPA).

itrust

Assets on iTrust's platform are stored with curv.

Curv is an Institutional Grade Wallet built on multi-authentication protocols that are industry standard for the banking and military sector.

This solution eliminates single points of failure like private keys and individual persons by splitting cryptographic signatures.

An elegant solution.

Curv is a 100% mathematical solution to the security problems caused by the private keys of traditional wallets which require only one user to use and can be compromised. Most solutions on the market today try to solve this vulnerability by hiding the keys in hardware or guarding them with people. The problem with this solution is that people are fallible, and whatever is hidden can always be found.

itrust