🔐Mr RoBOT's Security
It would be catastrophic for a team to undertake such a significant responsibility without firsthand knowledge of how to fully secure their infrastructure, employing all best practices and a defense-in-depth model. Our infrastructure operates within the TOR (Dark Web) network, utilizing both physical and virtual servers. Below is an overview of our security procedures from a high-level perspective:
We take daily backups, encrypt them, and host them on the Cloud automatically. This ensures that in the event of a physical disaster at our location, neither your data nor ours will be compromised.
We perform all operating system updates and run vulnerability scans on an automated schedule, ensuring our systems are always secure and up-to-date.
As security enthusiasts, we constantly stay informed about vulnerabilities in infrastructure and crypto, ensuring that we're always ahead in security measures.
Our firewalls are robustly configured; both our bot and servers are shielded from the public Internet, making them less vulnerable to external attacks.
In regards to in-house management of important credentials, we utilize password managers. Everything is encrypted, and we ensure to take regular backups for added security.

Last updated