Need help?

NiceHash Security


From a tiny hobby project of two university students back in 2014 to a global leader in mining and trading cryptocurrencies in 2021, NiceHash has evolved to become one of the safest crypto companies in the world and is an industry leader in security innovation for mining products.

First


Safety

Our team has years of experience dealing with information security, and has evolved to be some of the best prepared in the world, as well as working alongside some of the top global security companies, 365 days a year.

How NiceHash


Protects You

2-Factor Authentication

So only you can access your account. Make sure you enable this feature under settings.

Email Confirmations

Any unusual activity is immediately noticed and flagged on your account, and confirmations are needed for withdrawals.

SSL/TLS Encrypted Connection

Your connection to our website and services is always encrypted.

24/7 Multilingual Human Customer Support

With a priority line for account related issues.

Signed Software

QuickMiner’s source code is fully open source and signed by one of the strongest EV certificates, to guarantee its safety. We are the first mining software company to provide this extra security.

Verified Third Parties

NiceHash Miner only updates or adds digitally signed third party software, to ensure the end user is not at risk of any malicious activity by unknown authors. NHM also verifies the checksums on download.

Live Monitoring

Constant monitoring for suspicious activity around the clock.

How NiceHash


Secures Funds

Secure Storage

Funds are securely stored and distributed to prevent any unauthorised access.

Secure Process

Withdrawals are physically monitored 24/7 in real-time by our team for any suspicious activity.

Physical Security

NiceHash data storage is distributed in secure locations around the world with 24/7 surveillance.

Secure Wallets

Wallets and private keys are secured using AES-256 encryption.

Full Reserves

All funds are backed by real reserves, and can be withdrawn at any time by users.

KYC Verification

Buyers of hashrate and users of FIAT currencies on our exchange go through an identity verification, to prevent abuse of our platform.

AML regulation

We work closely with law enforcement agencies around the world to detect and prevent money laundering.

How You Can Further


Protect Yourself

Enable 2-factor authentication
(2FA) on your account
Enable email confirmations
NiceHash will never ask for your password, so
be wary of anyone who does
Check that emails are from
the real NiceHash
(you can enable an anti-phishing code in your account settings)
Use strong passwords
(you can check this guide here)
Do not share screenshots with private
details in them
Never publicly share your email
or wallet address
Check that you are interacting with our
verified social media accounts
Never give your account details to anyone other than through our official support channel, and do not share them on social media sites, not even through private messages

How NiceHash


Trains Its Staff


Staff are fully vetted before joining our team

All hard drives and data are encrypted

All staff receive regular cyber security training and awareness

Strong password policies and MFA are in place

Employee access is monitored and controlled in real-time

How NiceHash Protects


Your Data And Privacy


All data is securely stored, and encrypted both at rest and in transit

We use a variety of security measures to ensure the confidentiality, integrity, availability and privacy of your personal Information and to protect your personal information from loss, theft, unauthorized access, misuse, alteration or destruction.

Your privacy is of utmost importance to us, and it is our policy to safeguard and respect the confidentiality of information and the privacy of individuals.

To make sure your personal information is secure, we communicate our privacy and security guidelines to all our employees and strictly enforce privacy safeguards within the company. We are also GDPR compliant.

How NiceHash


Protects Blockchains

NiceHash has a unique position in the crypto industry, being one of the only large providers of hashrate on demand. Just like banks have physical security guards, decentralized Proof Of Work (PoW) networks have NiceHash. Our hashrate is regularly used by blockchain projects (both startups and established) to protect their networks from 51% attacks. We are an industry leader in this regard. If you wish to protect and secure your blockchain, register as a hashpower buyer here.

Bug Bounty Program

NiceHash operates a bug bounty program, where security researchers from around the world contribute to the security of our services.

Regular Penetration Testing

Both our internal and external security teams conduct regular pen-testing from all angles imaginable, including social engineering, to ensure our staff are constantly prepared.

Experience

Many companies never fully recover from a security breach, whereas NiceHash went from a tiny company that was a victim of its own success back in 2017 (where it was targeted by the Lazarus group) to featuring a fully restructured and beefed up security that rivals those of much bigger companies. User funds were refunded via a voluntary repayment scheme after this incident, as NiceHash takes every measure to ensure user protection. Needless to say, NiceHash makes security a number one priority at all times, and has hugely evolved over the years.

Easy, fast, and safe


Get started with NiceHash

Join the leading hub for mining and trading cryptocurrencies,
and the largest hashrate marketplace in the world.

GET STARTED