WEB3
COSYSTEM
Home
Admin
Unprocessed
Toggle Dark Mode
Audit Providers
Blockchains
Crypto Faucets
Exchanges
Jobs
Node Providers
Wallets
All Organizations
Captured data
Capture a URL
Go to the page
Fast load it
Prerender it
Status
Published
Draft
Archived
Name
Website url
Title
Buy, Sell & Trade Bitcoin & Other Crypto Currencies with Gemini's Best-in-class Platform | Gemini
Description
Gemini makes crypto simple. Find, Trade and Buy over 70 coins including bitcoin on the best cryptocurrency platform. Start trading crypto here.
Note
Linkedin url
Twitter url
Source code url
Discord url
Youtube url
Slack url
Telegram url
Reddit url
Twitch url
Instagram url
Pinterest url
Tiktok url
Substack url
Wikipedia url
Facebook url
Medium url
Privacy policy url
Terms of service url
Subprocessors url
Abuse url
About url
Team url
Audit report url
Whitepaper url
Status url
Support url
Blog url
Careers url
App url
Docs url
Community url
Bug bounty url
Events url
Pricing url
Security url
Faq url
Press url
Coingecko url
Coinmarketcap url
Year founded
Rss feeds
Found emails
Robots txt
User-agent: Twitterbot Disallow: User-agent: * Crawl-delay: 600 Disallow: /bitria100 Allow: /og/* Sitemap: https://www.gemini.com/sitemap.xml // not permitted to crawl a URL with query param refinement Disallow: /?*timestamp Disallow: /?*query // Block what Algolia uses for InstantSearch Disallow: /?*refinementList Disallow: /?*sortBy
Sitemap xml
Security txt
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Contact: psirt@gemini.com Encryption: https://www.gemini.com/static/pgp/gemini.asc Preferred-Languages: en Canonical: https://gemini.com/.well-known/security.txt Hiring: https://www.gemini.com/careers Bug Bounty Program Policy At Gemini, we welcome contributions from security researchers to help us build and secure the future of money. If you believe you’ve discovered a vulnerability, please submit a PGP-encrypted report to the contact address listed above. Our team will investigate all valid reports and do our best to respond in a timely manner. To ensure all parties' expectations are met, please review the entirety of this policy before submitting a report to Gemini. By making a submission or otherwise participating in this program, you acknowledge your agreement to the terms set forth below. Testing Guidance Whenever possible, research and testing should be performed on our sandbox. The sandbox provides researchers with easy and unfettered access to our platform, including expedited account registration and the ability to interact with fictitious funds. The sandbox versions of our properties can be found at the following locations: api.sandbox.gemini.com docs.sandbox.gemini.com exchange.sandbox.gemini.com mobile.exchange.sandbox.gemini.com mobile.sandbox.gemini.com sandbox.gemini.com static.sandbox.gemini.com Out-of-scope Issues All vulnerabilities related to or requiring the following are considered outside the scope of this program: Reports relating to login/logout CSRF; Reports relating to email enumeration; Reports relating to password strength or complexity; Reports relating to missing security hardening headers; Reports relating to rate limiting issues; Reports that target vulnerabilities on outdated or deprecated browsers, open source libraries, or infrastructure; Reports from automated tools or scans; Vulnerabilities that involve physical access to a device; Vulnerabilities or weaknesses in third party applications that integrate with Gemini; Social engineering of Gemini's employees, contractors, or customers; Our policies on presence/absence of SPF/DMARC/DKIM/CAA/BIMI records; Physical attempts to gain access to Gemini property or data centers; Ability to abuse existing banking functionality such as ACH or credit card chargebacks; Any access to data where the targeted user needs to be operating a rooted or jailbroken mobile device; Self-XSS or developer console code execution; Click-jacking, or issues only exploitable via click-jacking; API keys embedded in mobile applications and web front ends with no security impact, including but not limited to Google Maps, Sentry, MixPanel, and public keys; and URLs and parameters leaked to 3rd parties without demonstrated attacker access. Coordinated Disclosure Requirements Complying with our safe harbor policy requires researchers to adhere to a Coordinated Disclosure process. Coordinated Disclosure requires that researchers abide by the following requirements: Share a detailed report that includes all information as it relates to the vulnerability; Provide the Gemini team with a reasonable amount of time to respond to details outlined in the report, before providing any information to anyone other than Gemini; Do not access or modify our data or our users’ data without explicit permission. Only interact with your own accounts or test accounts for security research purposes; Do not profit from or allow another party to profit from a vulnerability; Do not defraud Gemini or its customers in the process of participating in our program; Act in good faith to avoid privacy violations, destruction of data, and interruption or degradation of our services (including denial of service); If you inadvertently caused a privacy violation, or accessed, modified or destroyed any user data, you must disclose this in your report; and Otherwise comply with all applicable laws. Safe Harbor Policy To encourage responsible disclosures, Gemini will not pursue civil action or initiate a complaint to law enforcement for security research if vulnerability disclosure activities are consistent with this policy and guidelines. We consider security research and vulnerability disclosure activities conducted in accordance with this policy and the guidelines set forth below to be “authorized” conduct under the Computer Fraud and Abuse Act, the DMCA and applicable anti-hacking laws such as Cal. Penal Code 502(c). We waive any DMCA claim against you for circumventing the technological measures we have used to protect the applications in scope. If legal action is initiated by a third party against you and you have complied with this policy, we will take steps to make it known that your actions were conducted in compliance with this policy. Please understand that if your security research involves the networks, systems, information, applications, products, or services of another party (which is not us), that third party may determine whether to pursue its own legal action against you. We cannot and do not authorize security research in the name of other entities. You are expected, as always, to comply with all applicable laws. Please submit a report to us before engaging in conduct that may be inconsistent with or unaddressed by this policy. Payouts Payout eligibility and amounts are decided at the discretion of our Security team and will follow the below mapping. Low severity : $150 Medium severity : $350 - $500 High severity : $1,500 - $5,000 Critical severity : $10,000 - $20,000 We only reward the first reporter of a vulnerability. Public disclosure of the vulnerability prior to resolution may cancel a pending reward. We reserve the right to disqualify individuals from the program for disrespectful behavior or violations of our Code of Conduct. We will not negotiate in response to duress or threats (e.g., we will not negotiate the payout amount under threat of withholding the vulnerability or threat of releasing the vulnerability or any exposed data to the public). The Fine Print We may modify the terms of this program or terminate this program at any time. We won’t apply any changes we make to these program terms retroactively. Scopes In Scope api.sandbox.gemini.com docs.sandbox.gemini.com exchange.sandbox.gemini.com mobile.exchange.sandbox.gemini.com mobile.sandbox.gemini.com sandbox.gemini.com static.sandbox.gemini.com niftygateway.com Out of Scope Any domain not explicitly listed above should be considered out-of-scope. If you believe that a given domain should be considered in-scope, please send an email to contact address listed above. -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEE0NPvHQMZdktS+NS5jxy+H7c0rXoFAmbrURAACgkQjxy+H7c0 rXrthBAAtWNydAfsuuOuE0w2nbB/ajqj064Iloycu7mCHa0Cb2chCp+pCWNaNVw5 RZr9hMsdMuQJ8fPCASdoWTsjLo05kTlTWNzH+UZaBgIO5ogm6e1FdtSZ4g7JcTFA fSnqpkitBB9D6js5soKRA4p3YBi5j5FDU8OQKbhOplhMoM1NgTSFjjDgC6YLOWl2 RFykJsnI9f/8jrb+263hbmtjDIrAyUGVEL5Kuf5zCXx73zvd0NTMaLE7Td0nXPWy aw7WRxVUuVwPTCHI7amEeV6kWTrwDKRdwNypkmFdgBDuyqzJ0edzot/WWoYeQH5d +TnhZ5XP2ez2BAdxZiSPnR9XgpPKN/Ve6N1+UMd9TLTlvv4H0akigZrHwcwNNsE3 vEAXu6CzQtbJgiqDuG2paqohsNsS7hYA4QyE622WkdPsDZgwboCFkGQPUixYXYqR ADTHFzCDNuQlc29qwAEMlBf8NzxcCC0SUNcINs8ZiG3sVLvev+WsrCoykjis8jdI sdbnVfNbGhNzTkh1SOwIjFdy2QNf5kcoyX9m0NGFimpjPK5wERg8Q+ZOdD25mFUX uWCXwZsYzztQKSLnubotGx5lJUisPoDH66IGCD3WI81K9ccP3yuHVOgKtjdJZT9m Ui8NppgalNRtHiJ5E4yFs9d84dTUf6Y/AkSWo5TH1V2COkwnVXM= =eDrS -----END PGP SIGNATURE-----
Humans txt
It security standards
CIS Controls and Benchmarks
FEDRAMP (Federal Risk and Authorization Management Program)
GDPR
HIPAA
NIST Cybersecurity Framework (CSF)
SLSA (Level 1)
SLSA (Level 2)
SLSA (Level 3)
SLSA (Level 4)
It security certifications
CCSS
CIS Critical Security Controls v8
ISO/IEC 27001/2 (Certification)
ISO/IEC 27017 (Certification)
ISO/IEC 27018 (Certification)
ISO/IEC 9001
PCI DSS (Certification)
SOC-1 type I
SOC-1 type II
SOC-2 Type I
SOC-2 Type II
SOC-3
Grc standards
COBIT
ISO/IEC 27001 (Standard)
ITIL
NIST SP 800-53
Offerings
Asset Bridging
Asset Custody
Blockchain
Blockchain Data
Block Explorer
Cloud Services Platform
Cross Chain Messaging
Crypto Accounting
Crypto Exchange: Centralized (CEX)
Crypto Exchange: Decentralized (DEX)
Crypto Exchange: Hybrid (HEX)
Crypto Faucet
Customer Service Platform
Dedicated Hosting and Colocation
Development Services
Fiat off-ramp
Fiat on-ramp
Fraud Prevention
Identity Management
Knowledge Base
KYC / AML as a Service
Load Testing
NFT Marketplace
Observability Stack
Oracle
Project & Issue Tracking
Recruitment Platform
Research
RPC Nodes (Dedicated)
RPC Nodes (Shared)
Smart contract assessment
Staking as a Service
Wallets (Individual)
Wallets (Institutional)
Employer insurance benefits
Accidental Death and Dismemberment (AD&D)
Dental
Disability
Healthcare
Legal
Life Insurance
Mental Health
Travel
Vision
Employer pension benefits
401(k) (US)
IRA (US)
Occupational Pensions (EU)
Pension Plan (Canada)
Pension Plan (US)
Personal Pensions (EU)
RRSP (Canada)
State Pension (EU)
TFSA (Canada)
Employer location policy
Fully Remote
Remote-First
Hybrid
On-Site
Employer wfh benefits
Ergonomic Support
Flexible Hours
Home Office Setup
Internet Allowance
Mental Wellness Programs
Professional Development
Technology Stipend
Found emails