Home Pricing How It Works About Blog API Docs Login Get Started Free

Security Policy

Last updated: April 2026  |  Effective date: April 2026

AES-256 encryption at rest
Read-only API access only
No private keys. Ever.

Security is not a feature at Ledgersys — it is the foundation. This policy explains exactly how we protect your account, your data, and your Bitcoin financial information. If you discover a security vulnerability, please report it responsibly to support@ledgersys.live. We take every report seriously.

1 Our Security Commitment

Ledgersys handles sensitive financial data. We treat that responsibility seriously. Our security commitments are:

Encryption everywhere

All data in transit is encrypted via TLS. All sensitive data at rest is encrypted with AES-256.

Read-only by design

Exchange API connections are read-only. Ledgersys can never move, trade, or touch your Bitcoin.

No private keys

We never ask for, store, or process Bitcoin private keys. Not ever. Not under any circumstance.

Minimum data collection

We collect only what is necessary to provide the service — reducing exposure by design.

72-hour breach notification

In the event of a breach affecting your data, we notify you within 72 hours of discovery.

Regular security reviews

We conduct ongoing security reviews of our infrastructure, code, and processes.

2 Infrastructure Security

The Ledgersys platform is hosted on managed infrastructure with the following security properties:

  • All connections to Ledgersys are encrypted via HTTPS using TLS 1.2 or higher. Unencrypted HTTP connections are redirected to HTTPS automatically.
  • Our hosting environment is isolated from other applications and benefits from platform-level DDoS protection and network monitoring.
  • Server access is restricted to authorised personnel only via key-based authentication. Password-based server login is disabled.
  • Automated backups are performed daily. Backup data is encrypted and stored separately from the primary database.
  • We monitor server logs continuously for suspicious activity patterns and failed authentication attempts.
  • Software dependencies are regularly updated to incorporate security patches.

3 Data Encryption

In Transit

All data transmitted between your browser and the Ledgersys platform is encrypted using TLS (Transport Layer Security). This includes all API calls, CSV uploads, form submissions, and dashboard interactions. We enforce HTTPS across every page and endpoint — no exceptions.

At Rest

The following categories of sensitive data are encrypted at rest using AES-256 encryption:

  • Exchange API keys and secrets submitted by users
  • User passwords — hashed using bcrypt with appropriate work factor, never stored in plain text
  • Session tokens and authentication credentials

Transaction data, tax calculations, and financial reports are stored in our secured database with access controls restricting direct access to authorised systems only.

Backups

Database backups are encrypted before being written to backup storage. Backup encryption uses the same AES-256 standard as primary data. Backups are stored in a location logically and physically separated from the primary database.

4 Account Security

Passwords

User passwords are never stored in plain text. When you set a password, it is immediately hashed using bcrypt — a deliberately slow hashing algorithm specifically designed to resist brute-force attacks. We store only the hash, never the original password. Even Ledgersys staff cannot see your password.

Session Management

User sessions are managed using cryptographically signed session tokens. Sessions are invalidated on logout, on password change, and after a period of inactivity. Session cookies are flagged as HttpOnly and Secure — they cannot be accessed by JavaScript and are only transmitted over HTTPS.

Protection Against Common Attacks

  • Cross-Site Request Forgery (CSRF): All state-changing requests require a valid CSRF token that is verified server-side.
  • Cross-Site Scripting (XSS): All user-supplied content is escaped before being rendered in the browser. We use templating systems that apply output encoding by default.
  • SQL Injection: All database queries use parameterised statements. Raw SQL concatenation with user input is prohibited in our codebase.
  • Brute Force: Login endpoints are rate-limited. Repeated failed authentication attempts trigger temporary lockout.

5 API Key Security

When you connect an exchange via API, you generate a read-only API key from your exchange and provide it to Ledgersys. Here is exactly how we handle it:

Encrypted immediately

API keys are encrypted with AES-256 at the moment they are received. They are never stored in plain text at any point.

Never displayed in full

After initial entry, API keys are never shown in full — only the last 4 characters are displayed for identification.

Never shared

Your API keys are never transmitted to any third party. They are used only to fetch your transaction data directly from your exchange.

Read-only enforced

Ledgersys only uses API keys to read transaction data. We never initiate trades, transfers, or withdrawals — and we recommend you generate keys with read-only permissions only.

Best practice: When generating an API key for Ledgersys on any exchange, always select Read Only or View permissions only. Never enable withdrawal, trading, or transfer permissions for any third-party application — including Ledgersys. If you are ever asked to provide withdrawal permissions to any service claiming to be Ledgersys, do not comply and contact us immediately.

6 Payment Security

Card Payments

Card payment processing is handled entirely by our payment processor. Ledgersys never receives, processes, or stores your card number, CVV, expiry date, or any other payment card data. Our payment processor is PCI-DSS compliant. We only receive a payment confirmation and the transaction amount.

Bitcoin Payments

Bitcoin payments are processed via BTCPay Server — a self-hosted, open-source, non-custodial Bitcoin payment processor. When you pay with Bitcoin, a unique payment address is generated for your transaction. We record only the transaction amount and on-chain confirmation status. We do not store any information about your Bitcoin wallet or your on-chain identity.

Bitcoin transactions are irreversible once confirmed on-chain. Ensure the amount and address are correct before sending. Ledgersys cannot reverse or recover a Bitcoin payment sent to the wrong address or in the wrong amount.

7 Access Controls

Internal Access

Access to Ledgersys production systems is restricted to authorised personnel only. Access is granted on a least-privilege basis — each person has access only to the systems and data required for their specific role. All internal access is logged and auditable.

Your Account Data

Ledgersys staff do not access your account data, transaction history, or financial reports as a matter of routine. Staff may access data only in the following circumstances:

  • At your explicit request for technical support
  • To investigate a security incident affecting your account
  • Where required by applicable law

All such access is logged with a reason recorded at the time of access.

Enterprise Role-Based Access

Enterprise plan holders can assign role-based access controls to team members — defining which data and functions each team member can access within their organisation's Ledgersys account. These controls are enforced server-side and cannot be circumvented by client-side manipulation.

8 Incident Response

In the event of a security incident, we follow a structured response process:

  • Detection: Our monitoring systems alert us to anomalies in real time. We investigate immediately.
  • Containment: Affected systems are isolated to prevent further exposure. Compromised credentials are invalidated.
  • Assessment: We determine the scope of the incident — what data was accessed, by whom, and for how long.
  • Notification: Affected users are notified by email within 72 hours of us confirming a breach. We will tell you exactly what happened, what data was involved, and what we are doing about it.
  • Remediation: The vulnerability is patched and the fix is verified. A post-incident review is conducted to prevent recurrence.
  • Regulatory notification: Where required by applicable data protection law, we notify the relevant regulatory authority within the required timeframe.

We will never downplay the severity of a security incident or delay notification to protect our reputation. Transparency is non-negotiable.

9 Vulnerability Disclosure

If you discover a security vulnerability in the Ledgersys platform, we ask that you report it responsibly. Please do not exploit the vulnerability or share it publicly before we have had a reasonable opportunity to investigate and remediate it.

How to Report

Send a detailed description of the vulnerability to support@ledgersys.live with the subject line "Security Vulnerability Report". Please include:

  • A clear description of the vulnerability and its potential impact
  • Step-by-step reproduction instructions
  • Any proof-of-concept code or screenshots (where relevant)
  • Your contact details so we can follow up

Our Commitments to Researchers

  • We will acknowledge receipt of your report within 48 hours
  • We will provide a status update within 7 days
  • We will not take legal action against researchers who report vulnerabilities in good faith
  • We will credit you in our security acknowledgements if you wish to be named
  • We will notify you when the vulnerability has been remediated

Scope: Our responsible disclosure policy covers the Ledgersys web application at ledgersys.live. It does not cover third-party services we use (hosting providers, payment processors, etc.) — please report those vulnerabilities directly to the relevant provider.

10 Your Responsibilities

Platform security is a shared responsibility. Here is what we ask of you:

Use a strong password

Use a unique password of at least 12 characters for your Ledgersys account. Do not reuse passwords across services.

Keep credentials private

Never share your Ledgersys password or API keys with anyone — including people claiming to be Ledgersys support.

Generate read-only API keys

When connecting an exchange, always generate a key with read-only permissions. Never enable withdrawal or trading permissions.

Report suspicious activity

If you notice anything unusual in your account — unexpected transactions, login alerts, or changes you did not make — contact us immediately.

Keep your devices secure

Keep your operating system and browser updated. Use a reputable antivirus tool. Lock your screen when you step away.

Log out on shared devices

Always log out of Ledgersys when using a shared or public computer. Do not save your password in shared browsers.

11 Security Updates

We continuously monitor our platform for security vulnerabilities and apply patches promptly when identified. For critical security vulnerabilities, we apply patches immediately — ahead of scheduled maintenance windows if necessary.

We update our software dependencies regularly to incorporate upstream security fixes. Our team reviews security advisories from our infrastructure providers, framework maintainers, and the broader security community on an ongoing basis.

Material security improvements are documented in our Changelog. Security incidents are documented on our System Status page.

12 Contact Us

For security-related enquiries, vulnerability reports, or to report suspicious activity on your account:

Security Email support@ledgersys.live
WhatsApp (urgent) 081 576 5075
Response Time Security reports acknowledged within 48 hours. Urgent account issues via WhatsApp for fastest response.

For non-security enquiries, please use our Contact page or visit the Help Center.

Built Secure from the Ground Up.

AES-256 Encryption

All sensitive data — API keys, passwords, session tokens — is encrypted at rest using AES-256. The same encryption standard used by financial institutions worldwide.

Military-grade encryption.

Read-Only by Design

Exchange API connections are read-only. Ledgersys is technically incapable of initiating trades, withdrawals, or any financial transaction on your behalf. Ever.

Can never touch your funds.

72-Hour Breach Notice

In the event of a security breach affecting your data, we will notify you by email within 72 hours — with full details of what happened and what we are doing about it.

Full transparency. Always.