Security Procedures
V 1 – Last updated 22 May 2025
Multi-layered Token Custody Policy
At Outlier Ventures, the safety of our team and the security of digital assets are paramount. To mitigate risk and eliminate single points of failure, we operate a strict multi-layered custody protocol:
No Individual Access
No individual—executive or otherwise—has unilateral access to any company-held crypto-assets. This includes hardware wallets, private keys, or access credentials.
Multi-signature Wallets
All assets are stored in cold storage using multi-signature wallets. Transactions require approvals from multiple authorised parties, including a mix of internal stakeholders and external custodians.
Third-Party Custodianship
We partner with reputable third-party custodians to enforce separation of duties and prevent any single person from having control over private keys or transaction execution.
Emergency Protocols in Place
In the event of attempted coercion or threat, security protocols are triggered that suspend wallet activity and alert both internal and external parties.