Zero Custody Architecture

Your funds. Your exchange. Your control.

Unic ONE is designed so that your funds are physically impossible for us to access. We never hold, store, or control your assets.

The API-Key-Only Model

Your assets remain on your exchange. We only request read and trade permissions — never withdraw.

Read Permission

View your portfolio balances, transaction history, and market data to calculate optimal rebalancing strategies.

Trade Permission

Execute spot market trades on your behalf to rebalance your portfolio according to your configured strategy.

NO Withdraw Permission

We explicitly do NOT request withdrawal permissions. Your funds cannot leave your exchange account through our platform.

How Exchange APIs Work

Major exchanges like Kraken and Coinbase allow you to create API keys with granular permissions. You control exactly what each key can do. Unic ONE's keys are restricted to read-only data access and spot trading — no withdrawals, no transfers, no margin.

Security Architecture

Your Exchange

Kraken / Coinbase

Funds Secured

API Key

Permissions: Read + Trade Only

Encrypted Connection (TLS)
Unic ONE logo

Unic ONE

Trade Execution Only

No Fund Access

Zero Fund Custody

Your crypto never leaves your exchange. We execute trades, but funds remain under your control at all times.

Credential-Based Authentication

No passwords on our servers. Your identity is cryptographically verified using verifiable credentials.

Verifiable Credentials

Authentication uses cryptographically signed credentials presented via the Hologram Messaging App. Your subscription level and identity are verified without storing passwords.

  • Cryptographic verification
  • No password storage
  • Session-based validation

Subscription Embedded

Your subscription tier (name + level) is embedded directly in the credential and verified on every connection, ensuring access control without centralized databases.

  • Real-time tier verification
  • Tamper-proof credentials
  • Decentralized identity

User-Controlled Access

You maintain complete control. Revoke access instantly by deleting the credential from your Hologram wallet — no need to contact support or wait for processing.

  • Instant revocation
  • No support tickets needed
  • Self-sovereign identity

Powered by Hologram

All authentication and communication flows through the Hologram Messaging App using DIDComm encrypted channels. This ensures end-to-end encryption and puts you in complete control of your identity and access.

Learn more about Hologram

Comprehensive Security Measures

Multi-layered protection at every level of our infrastructure.

API Key Encryption

All API keys are encrypted at rest using AES-256 and in transit via TLS 1.3. Keys are stored in isolated, access-controlled vaults with strict audit logging.

No Fund Custody

We never hold, store, or have access to user funds. Your crypto remains on your exchange under your control at all times.

DIDComm Encrypted Channels

All chatbot communication uses end-to-end encrypted DIDComm messaging. Messages are encrypted on your device and decrypted only by the intended recipient.

Infrastructure Security

Deployed on hardened cloud infrastructure with regular security audits, penetration testing, and compliance monitoring. SOC 2 Type II compliant.

Principle of Least Privilege

Our systems request the minimum exchange permissions necessary. Internal access controls ensure team members only access systems required for their role.

Continuous Monitoring

24/7 system monitoring with automated alerts for suspicious activity, failed authentication attempts, and anomalous trading patterns.

What We Cannot Do

Explicit technical limitations built into our architecture for your protection.

Cannot Withdraw Your Funds

Our API keys explicitly lack withdrawal permissions. We cannot initiate transfers of your crypto to any wallet or address.

Cannot Transfer to Other Wallets

Your crypto stays on your exchange. We have no mechanism to move funds to external wallets or addresses.

Cannot Access Beyond Trading

API restrictions limit us to read data and execute spot trades. No access to account settings, security configs, or personal information.

Cannot Lock You Out

Revoke the API key anytime to instantly disconnect Unic ONE. You maintain full control and can disable access in seconds.

Technical Impossibility by Design

These aren't just policies — they're technical constraints enforced by exchange APIs and our zero-custody architecture. Even if we wanted to access your funds (we don't), the infrastructure makes it impossible.

How Unic ONE Differs

Unlike platforms that custody your funds, Unic ONE never touches your assets.

FeatureUnic ONECustodial PlatformsDeFi Protocols
Fund Custody
You Control
Platform
Smart Contract
Can Withdraw Your Funds
Only You
Platform Can
Contract Logic
Counterparty Risk
Minimal
High
Smart Contract
Regulatory Compliance
Exchange Level
Platform Level
None
Instant Disconnection
Revoke API Key
Withdrawal Wait
Gas + Time

“The only entity that can move your funds is you.”

Unlike custodial platforms or DeFi protocols, Unic ONE operates purely via read/trade API keys. Your crypto remains on your exchange, under your complete control, at all times.

Security Certifications & Compliance

Our operation maintain the highest standards of security and compliance.

SOC 2 Type II

Certified

AES-256

Encryption

ISO 27001

Compliant

GDPR

Compliant

Security You Can Trust

Experience automated portfolio management without sacrificing control. Your funds stay on your exchange, always.

Optimize your Portfolio