No centralized third party can technically access your keys
We never have access to your account credentials. We can’t interact with your CeFi funds
Cede.store is a self-custodial wallet for your Centralized Exchanges API keys. Therefore, no centralized third party can technically access your keys. As they are not stored on a centralized database, there will never be such things as a «user API keys database leak».
We only use battle-tested code regarding security
Every security component of cede.store is reused from market security leader Metamask’s open-source code. Your API keys are encrypted on your device with your password using the highest security standards. Your password is never shared with anyone.
Your privacy is respected
Cede.store wallet doesn’t track any personally identifiable information, your account addresses or asset balances.
Go to Privacy PolicyCheck out our audit reports to learn more about how we protect your assets and ensure the integrity of our platform
Go to docs
Bug bounty
White hat hackers can be rewarded for finding vulnerabilities that may result in the loss of user funds
Coming soonAnalysis articles from our team
Team cede.store
How to protect yourself from cryptocurrency theft. Five tips
Read the article
Team cede.store
How not to lose your funds when using cryptocurrency
Read the article
Team cede.store
How to secure your crypto account? Best practices
Read the article
Here you can see and customise the information that we collect about you. To learn more, please read our privacy policy.