Canada's Advanced Digital Asset Exchange
Access your digital assets with confidence using our multi-layered security approach
Your NDAX account provides secure access to trading, portfolio management, and withdrawal capabilities. To maintain security, always access your account through our official website or mobile application.
We employ industry-leading encryption standards to protect your credentials and personal information during transmission and storage.
NDAX supports multiple authentication methods to ensure only authorized access to your account:
We recommend enabling at least two authentication methods for enhanced security.
To ensure account security, NDAX requires passwords that meet the following criteria:
Regular password updates are recommended for maintaining account security.
For your security, NDAX implements automatic session timeouts after periods of inactivity. Active sessions are displayed in your account settings, allowing you to monitor and manage access to your account.
You will receive notifications for new login attempts from unrecognized devices or locations, providing an additional layer of security awareness.
NDAX employs multiple security layers to protect your account and assets from unauthorized access.
All data is encrypted using AES-256 encryption both in transit and at rest.
Majority of digital assets are stored in offline cold storage facilities.
24/7 security monitoring for suspicious activities and potential threats.
Fully compliant with Canadian regulatory requirements and security standards.
Understanding our login procedure helps ensure a secure and seamless experience when accessing your account.
Enter your registered email address and password on the secure login page. Our system validates these credentials against our encrypted database.
If enabled, you'll be prompted to provide additional verification through your preferred 2FA method, such as an authenticator app or SMS code.
Our system performs security checks including device recognition, location analysis, and behavior patterns to detect anomalies.
Upon successful authentication, you gain access to your account dashboard with appropriate permissions based on your verification level.