Your funds.
Your exchange.
Your control.
Unic ONE is designed so that your funds are physically impossible for us to access. We never hold, store, or control your assets.
The API-Key-Only Model
Your assets remain on your exchange. We only request read and trade permissions — never withdraw.
Read Permission
View your portfolio balances, transaction history, and market data to calculate optimal rebalancing strategies.
Trade Permission
Execute spot market trades on your behalf to rebalance your portfolio according to your configured strategy.
NO Withdraw Permission
We explicitly do NOT request withdrawal permissions. Your funds cannot leave your exchange account through our platform.
How Exchange APIs Work
Major exchanges like Kraken and Coinbase allow you to create API keys with granular permissions. You control exactly what each key can do. Unic ONE's keys are restricted to read-only data access and spot trading — no withdrawals, no transfers, no margin.
Security Architecture
Your Exchange
Kraken / Coinbase
Funds Secured
API Key
Permissions: Read + Trade Only
Unic ONE
Trade Execution Only
No Fund Access
Zero Fund Custody
Your crypto never leaves your exchange. We execute trades, but funds remain under your control at all times.
Credential-Based Authentication
No passwords on our servers. Your identity is cryptographically verified using verifiable credentials.
Verifiable Credentials
Authentication uses cryptographically signed credentials presented via the Hologram Messaging App. Your subscription level and identity are verified without storing passwords.
- Cryptographic verification
- No password storage
- Session-based validation
Subscription Embedded
Your subscription tier (name + level) is embedded directly in the credential and verified on every connection, ensuring access control without centralized databases.
- Real-time tier verification
- Tamper-proof credentials
- Decentralized identity
User-Controlled Access
You maintain complete control. Revoke access instantly by deleting the credential from your Hologram wallet — no need to contact support or wait for processing.
- Instant revocation
- No support tickets needed
- Self-sovereign identity
Powered by Hologram
All authentication and communication flows through the Hologram Messaging App using DIDComm encrypted channels. This ensures end-to-end encryption and puts you in complete control of your identity and access.
Learn more about HologramComprehensive Security Measures
Multi-layered protection at every level of our infrastructure.
API Key Encryption
All API keys are encrypted at rest using AES-256 and in transit via TLS 1.3. Keys are stored in isolated, access-controlled vaults with strict audit logging.
No Fund Custody
We never hold, store, or have access to user funds. Your crypto remains on your exchange under your control at all times.
DIDComm Encrypted Channels
All chatbot communication uses end-to-end encrypted DIDComm messaging. Messages are encrypted on your device and decrypted only by the intended recipient.
Infrastructure Security
Deployed on hardened cloud infrastructure with regular security audits, penetration testing, and compliance monitoring. SOC 2 Type II compliant.
Principle of Least Privilege
Our systems request the minimum exchange permissions necessary. Internal access controls ensure team members only access systems required for their role.
Continuous Monitoring
24/7 system monitoring with automated alerts for suspicious activity, failed authentication attempts, and anomalous trading patterns.
What We Cannot Do
Explicit technical limitations built into our architecture for your protection.
Cannot Withdraw Your Funds
Our API keys explicitly lack withdrawal permissions. We cannot initiate transfers of your crypto to any wallet or address.
Cannot Transfer to Other Wallets
Your crypto stays on your exchange. We have no mechanism to move funds to external wallets or addresses.
Cannot Access Beyond Trading
API restrictions limit us to read data and execute spot trades. No access to account settings, security configs, or personal information.
Cannot Lock You Out
Revoke the API key anytime to instantly disconnect Unic ONE. You maintain full control and can disable access in seconds.
Technical Impossibility by Design
These aren't just policies — they're technical constraints enforced by exchange APIs and our zero-custody architecture. Even if we wanted to access your funds (we don't), the infrastructure makes it impossible.
How Unic ONE Differs
Unlike platforms that custody your funds, Unic ONE never touches your assets.
| Feature | Unic ONE | Custodial Platforms | DeFi Protocols |
|---|---|---|---|
| Fund Custody | You Control | Platform | Smart Contract |
| Can Withdraw Your Funds | Only You | Platform Can | Contract Logic |
| Counterparty Risk | Minimal | High | Smart Contract |
| Regulatory Compliance | Exchange Level | Platform Level | None |
| Instant Disconnection | Revoke API Key | Withdrawal Wait | Gas + Time |
“The only entity that can move your funds is you.”
Unlike custodial platforms or DeFi protocols, Unic ONE operates purely via read/trade API keys. Your crypto remains on your exchange, under your complete control, at all times.
Security Certifications & Compliance
Our operation maintain the highest standards of security and compliance.
SOC 2 Type II
Certified
AES-256
Encryption
ISO 27001
Compliant
GDPR
Compliant
Security You Can Trust
Experience automated portfolio management without sacrificing control. Your funds stay on your exchange, always.
Optimize your Portfolio