KYC – Security is our standard.

Trust is not built through words, but through verifiable processes. That is why our KYC framework is clearly structured, technically secured, and built according to the principle of least privilege.

At Quantum, Know Your Customer does not only mean identity verification — it also means protecting your assets, securing your API access, and safeguarding your data.

Security first. No compromises.

Why KYC is essential at Quantum

Digital assets require digital responsibility.

As soon as API interfaces are used, a technical connection is created between your broker account and our systems. This connection must be clearly identifiable, secured, and traceable.

Our KYC process ensures:

“Security at Quantum is not an add-on — it is the foundation.”

-Quantum Data Analytics

Our KYC models by product

What you can rely on:

Quantum Exclusive

Offline KYC via MiCA-licensed partners

With Quantum Exclusive, we work together with MiCA-licensed partners.
Quantum handles the technical design of the KYC process as well as the secure technical onboarding of customers.

Regulatory-compliant partner structure
Technical process execution by Quantum
Auditable system architecture

Quantum Pro

Comprehensive online KYC with controlled API setup

For Quantum Pro, we conduct a structured online KYC process, including guided API key creation. The goal is to ensure that only the legitimate account holder of a broker account can use our services.

Identity verification via online meeting
Documented verification (screenshot-supported)
API setup according to the strict API allowlist policy
Four-eyes review process through trained personnel

Quantum Premium

Subscription model with two-factor authentication

Quantum Premium is our security-optimized subscription model with mandatory 2FA.

Additional access security
Protected account access
Ongoing security standards

Step by step

What you can rely on:
1.

Invitation to a secure online call

You will receive an invitation to a structured online meeting.

During the meeting, identity verification and a comparison of the relevant account data will take place.

A screenshot documents the successful authentication.

The principle of data minimization applies — only necessary information is collected.

2.

Guided API key creation

The API key is created exclusively by you.

Quantum accompanies the process live and verifies the settings.

As soon as the API secret could become visible, screen sharing is paused.
Secrets must never be shown, transmitted, or stored.

Zero tolerance for API secrets.

3.

Verification of API permissions

Only the following permissions are allowed:

  • Data Reading
  • Spot & Margin Trading

Specifically not permitted are:

  • Withdrawal permissions
  • Transfer functions
  • Derivatives / options permissions
  • Staking/Lending

  • Withdrawal permissions
  • Transfer functions
  • Derivatives / options permissions
  • Staking/Lending

We strictly follow the least-privilege principle.

4.

Documentation of the API setup

After successful setup, a second screenshot is created.
This shows:

  • The activated permissions
  • The unique key assignment
  • No API secret
5.

Four-eyes principle & trained personnel

Every Quantum Pro KYC is conducted exclusively by trained personnel — mandatory under the four-eyes principle.

This reduces risks, prevents misconfigurations, and increases process integrity.

Data protection as a core company principle

Quantum stores KYC data exclusively:

With clearly defined access permissions


No private devices. No messengers. No shadow cloud solutions.


Data protection is not just a compliance obligation.

Data protection is a mindset.

Frequently Asked Questions about KYC

Still have questions?

Contact us — we’ll take care of your request.

Why is a KYC process necessary for API usage?
API access enables system connections to your broker account. Without clear identity and permission verification, a security risk arises. Our process ensures that only authorized persons are granted access.
Does Quantum store my API secret?
No. API secrets are neither displayed nor stored. As soon as a secret could become visible, screen sharing is paused.
Can Quantum execute withdrawals through my API?
No. Withdrawal permissions are technically excluded and not permitted.
How is my data protected?
KYC data is stored exclusively in approved internal systems.
Access is role-based, logged, and controlled.
Who performs the KYC?
Only trained Quantum employees — mandatory under the four-eyes principle.

Security begins with clarity.

Start your KYC process with a structured, transparent, and technically secured framework.