Safeguarding Your Digital Assets with Trust and Expertise

Established to operate as a regulated crypto storage wallet under the Indonesian regulator, the Commodity Futures Trading Regulatory Agency (BAPPEBTI).

More About Us

News & Events

Show All
What Is Crypto Custody?

What Is Crypto Custody?

When it comes to crypto custody, it works a little bit differently. Digital asset custodians do not technically store any of the assets because all data and transactions exist on a public ledger called the blockchain. Instead, what they guard are users’ private keys – the important part of a crypto wallet that grants access to the funds held in it.

Read more
What are Multi-Signature Wallets and How Do They Work?

What are Multi-Signature Wallets and How Do They Work?

n some cases, it is desirable to have multiple levels of approval for spending cryptocurrencies. As the name suggests, multi-signature wallets require authorisation of transactions through multiple keys, meaning that a group of users is required to sign to approve a transaction.

Read more
BAPPEBTI (CoFTRA): Crypto Asset Brochure

BAPPEBTI (CoFTRA): Crypto Asset Brochure

Crypto Asset Trading Supervision Booklet by BAPPEBTI (CoFTRA)

Read more

We Provide Secure and Dependable Crypto Asset Management

PT Kustodian Koin Indonesia, also known as ICC (Indonesian Coin Custodian), was founded to operate as a regulated crypto depository wallet under the Indonesian regulator, the Commodity and Futures Trading Supervisory Agency (CoFTRA).

Our primary purpose is to provide support for the crypto asset ecosystem in Indonesia’s crypto business.

Learn More

Technology & Features

Secure Encryption and Authentication

Methods employed to safeguard data by encoding it for privacy and verifying the identity of users for secure access.

Compliant Custodianship

Refers to the secure and regulatory-compliant management and safeguarding of assets or sensitive information, ensuring adherence to established standards and guidelines defined by Regulator.

Regular Security Audits and Penetration Testing

Involves systematic assessments of a system's defenses and vulnerabilities to ensure ongoing resilience against potential cyber threats.

Customizable Security Policies

Enables organizations to tailor and adapt their security measures to specific needs and evolving threats in order to maintain robust protection with highest compliance.

Multi-Sig Key Distribution

Reduces the risk of a wallet being hacked as a hacker would need access to every key. Providing an added layer of security by requiring multiple parties to approve every transaction.

We focused on safeguarding your digital assets with trust and expertise. Here are some points you could consider to use our services.
Show All

Members & Partners

Members
Partners