Skip to main content
Fellow combines bank-grade security protocols with cryptocurrency best practices, built on enterprise-grade infrastructure from Cred.ai and Privy to provide comprehensive asset protection across traditional and digital finance.
Multi-Layer Security: Fellow operates with defense-in-depth security, combining traditional banking compliance, advanced crypto security, and real-time AI risk management.

Banking Infrastructure Security

Fellow’s traditional banking services are powered by Cred.ai’s proprietary banking technology, built with full compliance management and licensed through WSFS Bank.

FDIC Protection

Deposits insured up to $250,000 through WSFS Bank, Member FDIC Full regulatory compliance and consumer protection

Banking Certifications

PCI DSS and EI3PA certified infrastructure Industry-standard security compliance for payment processing

Privacy Protection

Our banking partner Cred.ai never shares user dataStrict privacy controls and data protection policies

Infrastructure Security

Fellow operates on enterprise-grade security infrastructure that provides comprehensive protection across all financial operations.

Real-Time Fraud Monitoring

Advanced Detection Systems AI-powered fraud detection monitors all transactions in real-time, automatically flagging and preventing suspicious activity

Secure Transaction Processing

Multi-Layer Validation Every transfer goes through multiple security checks including identity verification, risk scoring, and automated approval workflows

Data Encryption

End-to-End Protection All sensitive data is encrypted in transit and at rest using industry-standard encryption protocols

Access Controls

Identity Management Multi-factor authentication, secure session management, and granular permission controls protect account access

Cryptocurrency Wallet Security

Fellow’s crypto capabilities are powered by Privy’s enterprise-grade wallet infrastructure, featuring hardware-secured, SOC 2-compliant wallets built on Trusted Execution Environments (TEEs) and distributed key sharding.

Self-Custody Architecture

True User Ownership Users have full custody of their wallets without needing to manage secret keys. Neither Privy nor Fellow ever see user keys

Hardware Security

TEE Protection Keys are only reconstructed in secure hardware environments, ensuring only owners can access their assets

Distributed Key Management

Shamir’s Secret Sharing Cryptographic keys are split using Shamir’s secret sharing and distributed across isolated services with no single point of failure

Cross-Chain Support

Universal Compatibility Support for EVM chains (Ethereum, Base, Arbitrum), Solana, Bitcoin, and more

Advanced Wallet Protections

  • Key Security
  • User Control
Defense-in-Depth ArchitecturePrivy’s security combines key sharding, end-to-end encryption, secure enclaves, and RBAC with micro-segmentation to enforce least privilege.Security Layers:
  • Hardware Isolation: Keys stored in secure enclaves (TEEs)
  • Encrypted Networks: All data transmission is encrypted
  • Distributed Storage: Key shards stored across isolated services
  • Role-Based Access: Least privilege access controls
No Single Points of Failure:
  • Multiple independent security layers
  • Redundant key storage across geographic regions
  • Automated failover and recovery systems

Credit Risk Management

Fellow’s instant transfer system includes comprehensive risk assessment and default handling processes to protect both users and liquidity providers.

ACH Settlement Monitoring

Real-time tracking of ACH transfers already in progress, providing confidence that funds will settle within 1-3 business days

Identity Verification

Connected bank accounts and wallets serve as proof of identity and fund ownership, reducing fraud risk

Credit Accountability

All credit activities can impact credit scores through standard reporting, maintaining user payment responsibility

KYC-Based Collections

Complete identity verification data enables professional collections processes when needed

Pool Risk Distribution

Individual defaults are socialized across the entire liquidity pool rather than affecting specific providers

Infrastructure Monitoring

Fellow provides real-time monitoring and transparency across all platform integrations to set proper user expectations.

Platform Latency Tracking

Continuous monitoring of response times across all connected banks, exchanges, and financial platforms

Settlement Performance

Public reporting on ACH settlement times and success rates to maintain transparency

Liquidity Pool Health

Real-time monitoring of pool utilization, performance metrics, and system stability

Platform Status

Live status updates for all integrated platforms and services to inform users of any issues

Transfer Validation Process

1

Transfer Request

User initiates instant transfer between connected accounts through Fellow’s interface
2

Account Verification

System validates that both source and destination accounts are properly connected and verified
3

ACH Initiation

Traditional ACH transfer begins immediately, providing confidence in upcoming settlement
4

Instant Liquidity

Pool provides immediate funds to destination while ACH processes in background
5

Settlement Monitoring

System tracks ACH completion over 1-3 business days and handles any exceptions

Liquidity Provider Protection

Fellow’s single-pool architecture includes sophisticated risk management to protect liquidity provider capital while maximizing returns.
  • Pool Structure
  • Default Handling
  • Performance Monitoring
Diversified Risk ModelInstead of individual LPs bearing specific risks, Fellow’s pool model socializes both gains and losses across all participants.Risk Distribution:
  • No Concentrated Exposure: No single LP exposed to individual user defaults
  • Short Duration: 2-4 day exposure periods limit risk timeframes
  • Small Positions: Many small credit instruments vs. few large exposures
  • Dynamic Limits: Credit limits adjust based on user behavior and pool capacity
Protective Mechanisms:
  • Reserve Fund: 10-20% of fees held for default protection
  • Utilization Caps: Maximum pool usage limits to maintain liquidity
  • Automated Rebalancing: Dynamic capital allocation based on risk metrics

Regulatory Compliance

Fellow operates under comprehensive regulatory oversight through its banking and technology partners.

Banking Regulations

Traditional Finance Compliance
  • FDIC insurance through WSFS Bank
  • Federal banking regulations
  • Consumer protection laws
  • Anti-money laundering (AML) compliance

Payment Processing

Industry Standards
  • PCI DSS certification
  • Visa network compliance
  • Payment card industry standards
  • Data security requirements

Cryptocurrency

Digital Asset Compliance
  • FinCEN MSB registration where required
  • State-level money transmission licenses
  • Crypto custody regulations
  • Cross-border transfer compliance

Security Incident Response

Fellow maintains comprehensive incident response procedures to address any security concerns quickly and effectively. 24/7 Monitoring:
  • Continuous system monitoring and alerting
  • Real-time fraud detection and prevention
  • Automated threat response systems
  • Human security team oversight
Incident Response Process:
  1. Detection: Automated systems and human monitoring
  2. Assessment: Rapid evaluation of threat severity
  3. Containment: Immediate measures to limit impact
  4. Recovery: Restore normal operations safely
  5. Communication: Transparent updates to affected users
User Protection:
  • Immediate account freezing for suspected compromise
  • Proactive user notifications for security issues
  • Full investigation and remediation of incidents
  • Insurance coverage for eligible losses

Best Practices for Users

Account Security

Protect Your Access
  • Use strong, unique passwords
  • Enable multi-factor authentication
  • Keep app updated to latest version
  • Don’t share login credentials

Transaction Safety

Safe Transfer Practices
  • Verify recipient addresses carefully
  • Use High Security Mode for large transfers
  • Monitor account activity regularly
  • Report suspicious activity immediately

Security Resources

Questions about security? Our security team and customer support are available 24/7 to address any concerns about account safety, transaction security, or privacy protection.