Security Guide
Comprehensive asset protection strategies to ensure your mining investment is secure
Security Dimensions
Protect your mining assets from multiple dimensions
Physical Security
- 24/7 professional security patrols
- Multi-factor authentication access control
- Comprehensive CCTV coverage
- Biometric technology (fingerprint/iris)
- Intrusion detection and alarm systems
Equipment Security
- Cabinet-level individual locks
- Dust, moisture, and corrosion protection
- Fire-resistant materials and suppression systems
- Equipment entry/exit logging system
- Regular security inspections
Network Security
- DDoS attack protection
- Network isolation and VLAN configuration
- Firewalls and intrusion prevention systems
- Regular security vulnerability scans
- Encrypted communication channels
Asset Security
- Multi-signature wallet mechanisms
- Hot and cold wallet separation
- Regular security audits
- Insurance coverage
- Emergency plans and disaster recovery
Pre-Hosting Checklist
Verification steps to complete before signing
1
Verify Provider Credentials
Check business licenses, industry certifications, operating history
2
Site Inspection
Personally or through third-party inspection of facilities
3
Contract Review
Clarify responsibilities, compensation terms, exit mechanisms
4
Confirm Monitoring System
Ensure real-time visibility of miner status
5
Insurance Coverage
Understand equipment and revenue insurance coverage
Wallet Security Best Practices
- Use hardware wallets for large holdings
- Enable two-factor authentication (2FA)
- Store seed phrases and private keys offline
- Use strong passwords and password managers
- Regularly check account activity
- Beware of phishing attacks and scams
⚠️ Security Alert
- • Never reveal private keys or seed phrases to anyone
- • HostingASIC will never ask for your private keys
- • Be cautious of unverified links and emails
- • Regularly check hosting provider operational status
- • Keep software and firmware updated
Discovered a Security Issue?
If you discover any security vulnerabilities or suspicious activity, please contact us immediately
Contact Security Team