Security & Trust
Your assets are protected
at every layer.
Roxom doesn't build security in isolation. We partner with the leading infrastructure providers in the industry to protect your assets and keep the platform clean.
In partnership with leading institutions in compliance, custody, and identity verification.
Infrastructure Partners
We don't build security from scratch.
Roxom partners with TRM Labs and Fireblocks so our users operate on the same tooling used by the most scrutinized financial institutions in crypto.Security is a discipline that requires best-in-class infrastructure, maintained by teams whose entire focus is staying ahead of threats. Roxom partners with TRM Labs and Fireblocks so our users operate on the same tooling used by the most scrutinized financial institutions in crypto.
Transaction Screening
We use TRM's platform to screen transactions and wallet addresses in real time against sanctions exposure, darknet activity, stolen funds, and other high-risk behaviors. Every deposit and withdrawal on Roxom is analyzed through TRM before it's processed.
organizations globally
risk scoring
largest scam database
Transaction Screening
TRM Labs
We use TRM's platform to screen transactions and wallet addresses in real time against sanctions exposure, darknet activity, stolen funds, and other high-risk behaviors. Every deposit and withdrawal on Roxom is analyzed through TRM before it's processed.
organizations globally
risk scoring
largest scam database


MPC Custody
Fireblocks
Roxom uses Fireblocks to custody client assets using MPC technology. There is no single key that can be stolen, copied, or lost. Cryptographic shares are distributed across multiple secure environments, and a transaction can only be executed when the required threshold of shares is combined.
ISO 27001 · CCSS
open-source framework
public program
Custody Technology
Multi-Party Computation
The private key never exists in full — anywhere.
MPC splits the key into several fragments distributed across different parties. Each share sits in an isolated environment. No single share is useful on its own.
key shares
single points of failure
signing latency
vs. Cold Storage
Hot-wallet speed
vs. Multisig
Cheaper, private
vs. HSMs
No physical POF
vs. Insider Threats
No solo access
Fund Protection
Segregated Accounts
Roxom holds client funds in accounts strictly separate from the company's operating funds. Your assets are never mixed with Roxom's and cannot be used for operational purposes. Not for investments, not for liquidity management, not for anything.
Why does this matter?
The safety of your assets does not depend solely on Roxom's financial health. It is built into the legal and operational structure of how funds are held.
What does it protect you from?
In the event of financial difficulties affecting Roxom, your funds remain identifiable as yours and sit outside the reach of the company's creditors.
Is this a legal requirement?
Yes. Account segregation is a regulatory standard across the jurisdictions where Roxom operates. It is not a commercial choice, it is an obligation.
Platform Safety
How we keep the platform safe
Roxom does not voluntarily disclose user information to third parties. Disclosure is only made where required by a valid legal order or permitted under applicable AML/CFT regulation.
Roxom operates under AML/CFT frameworks in El Salvador and the Seychelles. Our team reviews transactions in real time and screens users and counterparties against international sanctions lists.
AML/CFT Compliance
Roxom operates under AML/CFT frameworks in El Salvador and the Seychelles. Our team reviews transactions in real time and screens users and counterparties against international sanctions lists.
Continuous Monitoring
We monitor transaction patterns continuously. Unusual activity is flagged and reviewed before it escalates. All users and transactions are screened against global sanctions lists and politically exposed persons databases.
On-Chain Analytics
We use on-chain data to trace funds, identify high-risk counterparties, and detect patterns associated with financial crime.
Crime Prevention
Roxom's Financial Crime Prevention team monitors transactions, investigates suspicious activity, and acts on reports from users. Reports can be submitted anonymously.
Security Center
Report Suspicious Activity
Report suspicious transactions, phishing attempts, or impersonation. Reports can be anonymous.Report a transaction, wallet address, or behavior you consider suspicious. You can also report phishing attempts or any communication that impersonates Roxom. Reports can be submitted anonymously.
Submit a reportLaw Enforcement
Information Request
For government authorities and law enforcement only. Requires official institutional email.For government authorities and law enforcement agencies only. Submit official information requests, asset freeze orders, or judicial transfer instructions. All requests require an official institutional email address.
Submit a requestUser Guides
Protect yourself
Act fast, in this order.
01Secure your email first
Most account takeovers start there. If an attacker controls your email, they can trigger authentication flows and lock you out. Change your password and enable 2FA before doing anything else.
02Contact support
Write to [email protected]. Share your account email, a description of what you noticed, and any relevant timestamps. The more context you provide, the faster we can investigate.
03Review your transactions
Go to your transaction history and look for any withdrawals or operations you don't recognize. Note the amounts, timestamps, and destination addresses.
FAQ
Common questions
Follow Roxom
Stay in the loop.
Security updates, platform news, and community announcements — all in one place.
Trust is everything.
We don't build it alone.
Security is not a feature we build from scratch. It's a discipline that requires best-in-class infrastructure, maintained by teams whose entire focus is staying ahead of threats.