Legal

CordEx Privacy Policy

Last updated: January 2026

1. Wallets, Keys, and Trading Permissions

We support proxy trading wallets that are authorized to trade on a user's behalf on Hyperliquid.

  • We store encrypted private keys only for proxy wallets, not users' master or primary wallets.
  • Proxy wallets are permission-scoped:
    • They can execute trades on Hyperliquid only.
    • They cannot withdraw funds, transfer assets to other wallets, or interact with unrelated protocols.
  • The server is technically capable of decrypting proxy wallet keys in order to execute trades.
  • Trades may be executed while the user is offline, based on the permissions granted.

We do not store master wallet keys, recovery phrases, or unrestricted signing keys.

2. Encryption and Key Handling

  • Private keys are encrypted at rest using industry-standard encryption.
  • Decryption occurs only when required to perform an authorized trading action.
  • Access to decrypted keys is restricted to core trading services.

While strong safeguards are in place, no system can be guaranteed to be completely risk-free.

3. What We Do Not Do

We do not:

  • Store master wallet or custody wallets
  • Enable withdrawals or transfers to third-party wallets
  • Sell, rent, or trade user data
  • Use wallet data for advertising or profiling

4. Platform and Infrastructure Data

Our services run on third-party infrastructure providers (including Discord, hosting, and cloud services).

These providers may independently collect:

  • Metadata (e.g., timestamps, IP addresses, device or service identifiers)
  • Operational logs required for security and reliability

We do not control or override their data retention practices.

5. Chat and User-Generated Content

We do not provide chat features and do not store user-generated chat or message content.

6. Security Limitations

We take reasonable and proportionate measures to protect user data. However:

  • No system is immune to compromise
  • Users acknowledge the inherent risks of online services and cryptographic key handling

7. Compliance and Lawful Requests

We may disclose limited data if required to comply with:

  • Applicable laws or regulations
  • Valid legal processes (e.g., subpoenas or court orders)
  • Security or fraud prevention obligations

Any disclosure is limited to what is legally required.

8. Changes to This Policy

We may update this policy from time to time. Material changes will be communicated through appropriate channels.

If you have questions about this policy, contact the service operator through official support channels.