Skip to main content
All CollectionsIntroductionSecurity Model
How does GRVT’s security model differ from other CEXes and DEXes?
How does GRVT’s security model differ from other CEXes and DEXes?

GRVT's combination of Web2 and Web3 security controls

Updated over 4 months ago

GRVT combines the best security features of both CEXes and DEXes through a multi-layered approach, establishing several barriers for attackers. The model is generally made up of two layers:

  1. Web2 security: passwords and two-factor authentication

  2. Web3 security: private keys and smart contract-driven risk management

GRVT enhances Web3 security with an added Web2 layer, routing user requests exclusively through our backend. Only GRVT can execute transactions on L2 smart contracts, preventing public access and ensuring multi-layered security against unauthorized breaches.

Did this answer your question?