NitroDome
  • Introduction
    • Overview of NitroDome
    • Vision Statement
    • Key Features and Benefits
  • Project Background
    • The Problem
    • The Solution
    • Market Opportunity
  • Technology Stack
    • Blockchain Integration
    • Use of Artificial Intelligence
    • Security Measures
  • Products Overview
    • NitroGaming
      • NitroPortal
    • NitroMarket
    • NitroDex
    • RoboManiac
      • Story
      • FAQ
      • Beginners guide
      • Rules
    • Mintopoly
      • Welcome to Mintopoly
      • NFT Mintopoly Cards
      • Gameplay Guide
        • Side Competitions
      • Moon Overview
      • Accounts & Login
      • Initial Landrush
      • Exchange
      • Resources
      • $MM Token
      • Roadmap
      • ETH to Polygon Program
      • NFT Moon Bases
  • For Developers
    • Integrating Games with the NitroDome Platform
      • 1. Introduction to Blockchain
      • 2. Understanding NFTs
      • 3. Benefits of Web3
      • 4. What Makes the NitroPortal Unique?
      • 5. Security and API Management
      • 6. Real Game Assets to NFTs…and Back Again
      • 7. Introduction to NFT Types
      • 8. Asset Extraction and Injection
      • 9. Components of the NitroPortal System
      • 10. The Process Flow: Extraction and Injection
      • 11. Managing Security and Transactions
      • 12. Customization and Flexibility for Game Developers
Powered by GitBook
On this page
  1. Technology Stack

Security Measures

While prioritizing a user-friendly environment, NitroDome also focuses on robust security protocols:

  • Authentication: Instead of traditional MFA, NitroDome uses email and password sign-in for the gaming platform, with the option to connect Web3 wallets where users can sign messages to authenticate. Plans to include social login options such as Google are underway, further simplifying access while maintaining security.

  • Encryption and Audits: We ensure that all sensitive data is encrypted with state-of-the-art security practices. Regular audits, conducted by leading security experts, help us to continually strengthen our defenses and address any emergent vulnerabilities.

  • Decentralized Data Storage: Utilizing decentralized storage solutions enhances the security and integrity of user data by eliminating single points of failure and ensuring data redundancy.

PreviousUse of Artificial IntelligenceNextNitroGaming

Last updated 9 months ago