Security Procedures

V 1 – Last updated 22 May 2025 

Multi-layered Token Custody Policy

At Outlier Ventures, the safety of our team and the security of digital assets are paramount. To mitigate risk and eliminate single points of failure, we operate a strict multi-layered custody protocol:

  • No Individual Access

    No individual—executive or otherwise—has unilateral access to any company-held crypto-assets. This includes hardware wallets, private keys, or access credentials.

  • Multi-signature Wallets

    All assets are stored in cold storage using multi-signature wallets. Transactions require approvals from multiple authorised parties, including a mix of internal stakeholders and external custodians.

  • Third-Party Custodianship

    We partner with reputable third-party custodians to enforce separation of duties and prevent any single person from having control over private keys or transaction execution.

  • Emergency Protocols in Place

    In the event of attempted coercion or threat, security protocols are triggered that suspend wallet activity and alert both internal and external parties.