KYC – Security is our standard.
Trust is not built through words, but through verifiable processes. That is why our KYC framework is clearly structured, technically secured, and built according to the principle of least privilege.
At Quantum, Know Your Customer does not only mean identity verification — it also means protecting your assets, securing your API access, and safeguarding your data.
Security first. No compromises.
Why KYC is essential at Quantum
Digital assets require digital responsibility.
As soon as API interfaces are used, a technical connection is created between your broker account and our systems. This connection must be clearly identifiable, secured, and traceable.
Our KYC process ensures:
“Security at Quantum is not an add-on — it is the foundation.”
-Quantum Data Analytics
Our KYC models by product
What you can rely on:
Quantum Exclusive
Offline KYC via MiCA-licensed partners
With Quantum Exclusive, we work together with MiCA-licensed partners.
Quantum handles the technical design of the KYC process as well as the secure technical onboarding of customers.
Quantum Pro
Comprehensive online KYC with controlled API setup
For Quantum Pro, we conduct a structured online KYC process, including guided API key creation. The goal is to ensure that only the legitimate account holder of a broker account can use our services.
Quantum Premium
Subscription model with two-factor authentication
Quantum Premium is our security-optimized subscription model with mandatory 2FA.
Step by step
What you can rely on:
Invitation to a secure online call
You will receive an invitation to a structured online meeting.
During the meeting, identity verification and a comparison of the relevant account data will take place.
A screenshot documents the successful authentication.
The principle of data minimization applies — only necessary information is collected.
Guided API key creation
The API key is created exclusively by you.
Quantum accompanies the process live and verifies the settings.
As soon as the API secret could become visible, screen sharing is paused.
Secrets must never be shown, transmitted, or stored.
Zero tolerance for API secrets.
Verification of API permissions
Only the following permissions are allowed:
- Data Reading
- Spot & Margin Trading
Specifically not permitted are:
- Withdrawal permissions
- Transfer functions
- Derivatives / options permissions
- Staking/Lending
- Withdrawal permissions
- Transfer functions
- Derivatives / options permissions
- Staking/Lending
We strictly follow the least-privilege principle.
Documentation of the API setup
After successful setup, a second screenshot is created.
This shows:
- The activated permissions
- The unique key assignment
- No API secret
Four-eyes principle & trained personnel
Every Quantum Pro KYC is conducted exclusively by trained personnel — mandatory under the four-eyes principle.
This reduces risks, prevents misconfigurations, and increases process integrity.
Data protection as a core company principle
Quantum stores KYC data exclusively:
With clearly defined access permissions
No private devices. No messengers. No shadow cloud solutions.
Data protection is not just a compliance obligation.
Data protection is a mindset.
Frequently Asked Questions about KYC
Still have questions?
Contact us — we’ll take care of your request.
Access is role-based, logged, and controlled.
Security begins with clarity.
Start your KYC process with a structured, transparent, and technically secured framework.




















