British FINTECH-startup Revolut with Russian roots opened to holders of standard accounts access to purchase bitcoin, Cash Bitcoin, Ethereum, Litecoin and XRP. However, users soon found that working with digital assets is limited.

As reported by the journal ForkLog one of the readers, no transactions except for the purchase, exchange cryptocurrency for Fiat and send to another user Revolut unavailable.

“You can not send a crypt on the other cryptomodule. Exchange to Fiat is done through the exchange of their companion and for this Revolut take 1.5%”, — he wrote.

But the main concern of the reader is called to the fact that private keys to access your cryptocurrency is stored in a “wallet, belonging to the area”.

Manager of public relations Revolut Kieran Wylie in the comment ForkLog confirmed that currently the platform does not support the transmission of cryptocurrency beyond it, such as external wallets. Did not refute the amount of the fee.

“Our course is based on data from cryptocurrency exchanges, with which we cooperate, plus a 1.5% margin to account for volatility,” he added.

Responding to a question of security Wiley, noted that the Revolut while not issuing a separate wallets.

“After the purchase, the cryptocurrency is securely stored in a “virtual” pool account, combining hot and cold wallets. It is a repository of private keys of the virtual currency. We have our own internal Ledger, which records your risk, which is reflected in cryptocurrency account in the app Revolut”, — said the representative of the company.

The standard type of account Revolut provides the user with free access to platform services: current account in the UK and the international account number IBAN in Euro. In a month the client can no Commission to exchange up to £ 5,000 ($6640) and remove up to 200 pounds ($265). Now joined them, and work with digital assets.

Recall that in February representatives Revolut announced the recruitment of a team of hackers to hack their own system. Therefore, the company intends to identify the vulnerabilities of their IT systems.

Source