🔐Mr RoBOT's Security

It would be catastrophic for a team to undertake such a significant responsibility without firsthand knowledge of how to fully secure their infrastructure, employing all best practices and a defense-in-depth model. Our infrastructure operates within the TOR (Dark Web) network, utilizing both physical and virtual servers. Below is an overview of our security procedures from a high-level perspective:

  • We take daily backups, encrypt them, and host them on the Cloud automatically. This ensures that in the event of a physical disaster at our location, neither your data nor ours will be compromised.

  • We perform all operating system updates and run vulnerability scans on an automated schedule, ensuring our systems are always secure and up-to-date.

  • As security enthusiasts, we constantly stay informed about vulnerabilities in infrastructure and crypto, ensuring that we're always ahead in security measures.

  • Our firewalls are robustly configured; both our bot and servers are shielded from the public Internet, making them less vulnerable to external attacks.

In regards to in-house management of important credentials, we utilize password managers. Everything is encrypted, and we ensure to take regular backups for added security.

Last updated