April 16, 2026

Capitalizations Index – B ∞/21M

Custodial Wallets: Third Parties Hold Bitcoin for Users

Custodial wallets: third parties hold bitcoin for users

Custodial wallets are cryptocurrency storage services in which a third party holds and manages a user’s bitcoin private keys and access credentials on the​ user’s behalf. The adjective “custodial” ‍denotes⁤ custody or guardianship-who has control, care‍ or custody of another’s property-a concept used in legal and everyday contexts to describe the party responsible for safeguarding assets [[2]][[3]]. By entrusting private keys to an intermediary such as an exchange or hosted wallet provider, users gain convenience, integrated services, and options for account recovery, ⁣while ⁤also assuming counterparty risk, exposure to the ⁤provider’s security practices, and potential regulatory or access constraints. This article explains how custodial wallets operate, outlines the trade-offs between convenience and self-custody, and highlights the operational, security and legal considerations people should weigh when ⁣deciding whether ⁤to place their bitcoin under third-party custody.

Understanding Custodial​ Wallets and the Role of Third Party Custodians

custodial​ wallets ⁣ are services where ⁤a third party holds⁢ the private keys and manages on-chain transactions on behalf of users, effectively acting as a guardian⁣ for ⁢digital assets. this arrangement transfers technical custody from the individual to the provider, so users rely ⁣on the custodian for safekeeping, access and transaction execution. The term “custodial” is closely tied to concepts of custody and guardianship⁤ in standard definitions of the word, reflecting the custodian’s ⁤role in holding and overseeing assets rather than the user directly controlling the keys [[2]][[1]].

Third-party custodians typically provide⁣ a bundle of services designed to combine convenience with institutional controls.Common offerings include:

  • Key management: hardware-backed storage and multi-signature setups;
  • Regulatory and compliance support: KYC/AML onboarding and reporting;
  • Insurance and custodial guarantees: policies or reserves‍ to cover certain losses;
  • Recovery and user support: account recovery mechanisms and customer service.

A simple comparison⁣ highlights trade-offs for a typical user versus self-custody:

Aspect Custodial Self-custody
Control Third party holds keys User‌ holds keys
Convenience High – managed UI & support Lower ⁢- ​requires technical care
Counterparty risk Present Minimal (but user error risk)

reference

[[3]]

When‍ choosing a custodial wallet, weigh the convenience of an integrated service against the inherent counterparty and legal risks: custodians can be subject to hacks, regulatory orders ‍or insolvency, which may affect access to funds. Prioritize custodians with clear security practices, verifiable audits, clear insurance terms and well-defined jurisdictional policies. For prudent decision-making, verify operational details (cold ⁢storage⁣ ratios, multi-signature usage), ​ask⁤ about incident response⁤ plans, and​ confirm how user ‍rights⁢ are⁢ defined in the provider’s​ terms-these are practical steps that help align the custodian’s⁣ services with your risk​ tolerance and needs [[1]][[2]].

How custodial security works: key management, access control and common vulnerabilities

how Custodial Security works: Key⁣ Management, Access Control and Common Vulnerabilities

Custodial providers hold and manage users’ private keys, so key-management architecture ​is the cornerstone of security. Typical‍ practices include using hardware security modules (HSMs),multi‑party computation (MPC) to avoid single-key exposure,segregated hot/cold wallets,and routine key rotation and backups. Providers present⁢ these technical choices as ‌part of their custodial⁢ role – a legal and practical guardianship over assets [[2]][[3]]. Key management implementations⁢ vary by threat model and scale, ⁢but all aim to balance ‌accessibility for user withdrawals with minimized online​ attack surface.

Access control combines cryptographic safeguards and organizational policies to regulate who can initiate,⁣ approve, and execute transactions.Common ​controls include:

  • Multi‑signature ‍or threshold ⁣signing workflows requiring separate approvers
  • Role‑based access​ with least‑privilege administrative ‍accounts
  • Strong ⁤authentication ‌(2FA, FIDO2) and separate signing networks for offline keys
  • Continuous logging, ‌auditing, and anomaly detection for withdrawal flows

These measures ‍reflect the custodial duty to supervise and protect ‌users’ assets and personal custody rights as part​ of a broader⁤ guardianship framework [[1]].

Common vulnerabilities arise from centralized trust, human error,⁢ and software flaws. Typical issues include insider compromise, single points of failure in⁤ key storage, exploitable APIs, weak operational procedures, and social‑engineering attacks ​on support staff. Rapid reference:

Vulnerability Typical Mitigation
Single key compromise Threshold signatures ​/ distributed custody
Insider misuse Segregation of duties, audits
Software bug / exploit Code audits, bug bounties, staged⁣ rollouts

Providers must transparently publish controls, incident response plans, and proof of autonomous audits to reduce ⁤risk; absent ⁢those, users face increased exposure to the custodial ‍risks described above.

Regulatory Landscape and Compliance Obligations for Custodial Wallet Providers

Custodial service providers shoulder more than​ simple storage:‍ they perform ​a guardianship role that combines technical custody with legal and financial responsibilities. Stakeholders and⁢ regulators treat these firms as entities that must protect⁣ user assets, maintain accurate records, and control access to private keys-functions commonly associated with the concept of custody or guardianship ⁣as defined in mainstream references [[2]][[1]][[3]]. Typical operational responsibilities ‌include:

  • Key management: generation, storage, and rotation of private keys
  • Access controls: multi‑sig, ‍hardware security modules, ⁢role segregation
  • Recordkeeping: transaction logs, reconciliations and proof of reserves

Regulatory frameworks ⁢focus on mitigating financial crime,​ protecting consumers, ⁤and ​ensuring operational resilience. ⁢Common compliance obligations for custodial wallet providers include AML/KYC programs, licensing or registration (e.g., money‑transmission or payment institution regimes), capital and segregation requirements, audit and reporting mandates, and mandatory cybersecurity controls. For a compact overview, ‌regulators typically evaluate obligations like the following:

Obligation typical Requirement
AML/KYC Customer ID, transaction monitoring
Licensing state or national registration
Safekeeping Segregation,‍ insurance disclosures

Regulators expect documented programs and demonstrable⁤ controls ⁣that align with ​the custodial function described in authoritative sources⁤ [[1]].

To meet these obligations, best practices combine governance, transparency and technical rigor. Operators should​ implement a formal compliance program‌ with ⁣an independent compliance officer, regular third‑party security and financial audits, publicly verifiable proofs such ⁣as audited proof‑of‑reserves, and clear user disclosures about custody terms and insurance coverage. Key items‌ to prioritize are:

  • Independent audits – financial and security ⁢assessments
  • Proof of reserves – auditable attestations of holdings
  • Clear user agreements ⁢ -‌ scope of custody, redemption processes, and recourse

Adopting these measures helps firms demonstrate⁣ that their custodial role meets both⁣ the practical⁢ expectations of users and the legal⁢ standards implied by custodial definitions‍ in reputable references [[3]].

Operational Risk Factors and Metrics to Use When Evaluating⁣ Custodian Reliability

When assessing ⁢a⁤ third party that⁤ holds users’ bitcoin, focus first ⁤on concrete ‌operational risk factors that ⁤affect custody integrity and availability. Key areas ‍to probe include:

  • Key management -⁤ generation,storage,ceremony practices,and ⁢split of hot/cold keys;
  • Access controls & segregation – least privilege,multi‑party approval,and⁢ separation of duties;
  • Dependency & concentration – reliance on single vendors,cloud providers,or signing services;
  • Reconciliation‍ & accounting ‌ – cadence ⁤and ‍automation of on‑chain vs ledger reconciliation;
  • Resilience & incident readiness – backup locations,DR plans,and recovery objectives.

These roles and responsibilities are what ‍define a custodian in practise-an entity charged‍ with safeguarding assets and‌ preventing loss or theft [[2]], and more broadly a party with protective responsibility for client property [[1]].

Quantitative metrics make reliability comparable across providers. Useful ⁣metrics include:

  • Uptime & service ‌availability – percent of‌ time signing/API services are reachable;
  • Reconciliation frequency – daily on‑chain vs ledger match rate;
  • Proof ‍of reserves cadence – frequency and scope of third‑party attestations;
  • Insurance coverage – type,limit,and exclusions specific to cryptographic loss;
  • Audit & certification status – ⁤SOC 2,ISO 27001,penetration test results.
Metric Good benchmark
Service availability ≥ 99.95%
Reconciliation Daily,⁢ automated
proof of reserves Quarterly ⁢independent ‍attestation

Beyond metrics, inspect operational controls and behavioral indicators that predict future reliability: employee ‍turnover in critical ops, documented key‑ceremony procedures, frequency⁤ of access reviews, vendor risk ‌assessments,‌ and the speed of incident detection and remediation (MTTD/MTTR). Look for clear segregation between custody and accounting teams, routine cold‑wallet drills, and transparent public ‌reporting ​of incidents and⁣ fixes.Where possible, validate claims with external attestations and sample logs-these​ practices embody the custodian function of safeguarding client assets and limiting exposure to theft, ⁤loss, or operational failure [[1]] [[2]].

Fee Models, Liquidity Constraints and Transaction Limits to Consider Before Depositing bitcoin

Understand the fee architecture ‍ before entrusting another party with your coins: ​custodial platforms commonly layer a platform service fee on top ⁤of the blockchain’s network (miner) fee, and those components can be fixed, tiered, or dynamically adjusted based ⁣on market congestion. some providers ​absorb small on-chain fees for internal transfers ⁤and charge only for withdrawals; others charge‍ a percentage of assets under custody or⁤ a monthly maintenance fee. Always check how the provider⁢ calculates and ​presents fees so you can estimate total cost for deposits, internal transfers and exits -‌ transparency varies across services and⁣ documentation should be reviewed carefully [[2]].

Liquidity and operational⁤ limits affect access. Even if your balance shows ⁢as available, practical access can be limited by:

  • Withdrawal caps (daily/monthly​ maximums that may require staged exits)
  • Minimum withdrawal amounts that make small balances impractical to move on-chain
  • Processing windows when withdrawals are batched or manually reviewed
  • KYC/AML holds that can delay ‍or freeze transfers pending documentation

These constraints ‍change the effective liquidity of your holdings and may force you to accept⁤ partial exits or higher fees during peak demand – ⁤community discussions and support threads ​are useful sources for real-world reports of delays and limits [[3]].

Compare costs and constraints side-by-side before depositing. ⁤A simple reference table⁢ highlights typical considerations and their likely impact:

Charge / limit Typical Range Impact
Custody fee 0-2% annual / $0-$50 monthly Recurring cost
Withdrawal fee $0-$50 + ⁤network Exit cost
On-chain (network) Varies by mempool Can spike with congestion

Weigh the total expected⁢ cost and the platform’s liquidity policies against the convenience of delegated custody – small, frequent trades or urgent withdrawals favor low-latency,‌ low-limit services, while​ long-term storage may ‍tolerate higher custody fees; always validate terms in the⁢ provider’s docs and support channels before moving funds [[1]].

Practical user Recommendations for Choosing a Custodial Service and Setting Up Accounts Securely

When selecting a custodial bitcoin service, prioritize transparency, regulatory compliance, and verifiable ⁢controls-custodial providers have a duty​ to supervise and protect user⁤ assets, a concept reflected in standard definitions‌ of custodial responsibility[[1]][[2]]. Evaluate public ⁣evidence of audits or proof-of-reserves, clear insurance terms, custody architecture (hot vs. cold storage), and whether the firm segregates customer funds from operational wallets. Look for firms with independent ⁤third‑party attestations and a documented incident-response plan before you commit funds.

  • Proof-of-reserves: on‑chain evidence or audited attestations
  • insurance & limits: what’s covered and exclusions
  • Regulation & licensing: local or international ‌oversight
  • Operational controls: multi‑sig,cold storage ratios,staff access policies

Secure account setup is as vital as provider choice.‌ Use strong, unique credentials, ⁤enable ⁢multi‑factor authentication (prefer ‍hardware‍ or app‑based 2FA over SMS), create withdrawal whitelists, and restrict API keys and permissions. Complete KYC only with reputable​ providers, and retain copies of verification records securely. If ⁣the custodian offers optional layered protections (hardware‑backed signatories, time‑locks, or withdrawal ​delays), enable them to reduce exposure to account compromise.

  • Password hygiene: password manager + long passphrase
  • 2FA: hardware key​ or authenticator app
  • Withdrawal controls: whitelists,delays,and multi‑approver flows
  • Least⁣ privilege: restrict API scopes and ⁢admin access

Maintain operational hygiene and contingency planning: test with a small‍ initial deposit,monitor activity and​ periodic statements,and keep an ⁢off‑site record of account recovery procedures.⁣ Establish escalation contacts, understand the provider’s dispute resolution and insolvency policies, and periodically reassess ⁣the ⁢custodian’s health.‍ For large holdings, consider splitting exposure between custodians and/or combining custodial and self‑custody strategies to balance convenience against control.

Checklist Quick action
Small test deposit Send 1% first
Enable strong 2FA Use hardware or app‑based 2FA
Confirm insurance Read exclusions
Document recovery Store offline copy

What Security Guarantees to Expect from Custodians and Minimum Controls You ⁤Should Demand

Licensed custodians should deliver clear, contract-backed assurances that go‍ beyond marketing. Expect explicit ⁤statements on asset segregation (customer keys⁢ and balances held separate from corporate ‌treasury), publicly auditable proof-of-reserves, named insurance limits and exclusions,⁣ and the ⁤legal jurisdiction that governs custody agreements. These​ responsibilities flow ​from the basic meaning of a custodial role -​ the duty to supervise and protect another party’s assets – so insist on documentation that ties those duties to verifiable controls and remedies​ [[2]][[3]].

Minimum operational and technical controls you should demand:

  • Proof-of-reserves: ⁣Merkle-backed or or else publicly verifiable snapshots and regular‌ reconciliations⁣ with on-chain data.
  • Cold storage + multi-signature: Majority of assets retained offline with true multi-operator signing to prevent single-point compromise.
  • Separation of duties: Clear operational segregation between signing, reconciliation, and accounting teams with least-privilege⁤ access.
  • independent audits &⁤ attestations: Regular SOC 2 / ISO-type reports and⁤ external forensic-capable audits with ‍public summaries.
  • Insurance & recovery plans: Explicit policy​ coverage,caps,and a tested incident response & customer remediation workflow.
  • Transparent governance: Public‍ incident disclosures, clear escalation paths, and written customer legal remedies.
Control What it protects Minimum proof
Proof-of-reserves Customer balance integrity Public Merkle snapshot
Multi-sig cold vaults Key compromise⁤ & insider risk Key-holder attestation
Third-party audits Operational & financial transparency SOC 2 / audit summary

Demand these ‌items in writing ⁣and make transparency a contractual ‍requirement – custodians are fulfilling a classic custodial duty and your safest position⁢ is ​to convert promises into verifiable controls and enforceable remedies [[1]].

Incident⁤ Response, Insurance and Recovery Procedures Custodians Should Provide

Containment and triage must be immediate‍ and well-documented. Custodians should have playbooks that trigger automatic containment actions-suspension of withdrawals,isolation of affected systems,and forensic image capture-paired with clear owner⁣ assignments and⁤ timestamps. Example immediate steps include:

  • Freeze affected keys/wallets to prevent further movement.
  • Preserve logs and chain-of-custody ⁢ for on-chain and off-chain evidence.
  • Notify regulators, insurers and impacted users ‌ within predefined SLA windows.

The word “incident” in this context refers to​ any discrete event ​or happening that is unusual or harmful, as commonly defined in ⁢industry dictionaries[[1]][[2]].

Insurance coverage and claims processes should ⁣be explicit and testable. Custodians must publish the types and limits of ⁢insurance they carry,what triggers a claim,and any material exclusions. A compact reference table helps ⁤users compare protection at a glance:

Policy Type Typical Cover Expected Payout⁢ Window
cyber/First‑Party Theft, hacking 30-90 days
Crime/Third‑Party Employee theft, social engineering 30-120 days
Custodial Liability User asset loss due to custodian error 60-180 days

After an event, the claims workflow should include⁢ a dedicated claim ⁤lead, a documented proof-of-loss package, and coordination steps for ‍reinsurers⁤ and ​external adjusters.

Recovery, remediation and governance ‍close the loop. Recovery plans must define reimbursement scope (full, partial, or ‍escrowed), technical recovery steps (key rotation, multi-sig reconstitution, chain-of-responsibility fixes), and timelines ⁤for ⁤customer restitution. Ongoing governance actions after an incident⁢ should include:

  • Root-cause analysis ‍and a public remediation roadmap.
  • Independent ⁣audit or attestation ‌before resuming normal operations.
  • Policy and reserve adjustments with periodic stress testing and transparent reporting.

These measures help restore⁤ user confidence and reduce future exposure through clearer insurance alignment, faster recovery and demonstrable operational improvements.

Decision Framework and Checklist for ‌When to Use custodial ⁤Services⁣ Versus Self Custody

When deciding ⁣between entrusting a third party to ‍hold ‍bitcoin and managing private keys yourself, weigh the core trade-offs: ⁢ security vs. convenience, ⁤ legal recourse vs. absolute control, ​and operational complexity vs. ease of use.Custodial services can simplify onboarding, fiat integration, and recovery procedures, but they introduce counterparty risk and ‍dependence on the ​provider’s security practices. Conversely, self custody offers maximal control ⁣and reduced counterparty exposure at the cost of requiring ⁣secure key management, backups, and the skills to recover funds after loss. Note that “custodial” ⁤also applies outside crypto (such as, janitorial or property custodial services), which underscores the general pattern of third-party responsibility versus direct‍ control [[1]][[3]].

  • Risk tolerance: If you cannot accept third-party insolvency or seizure risk, favor self custody.
  • Technical capability: Choose custodial if you​ lack experiance with seed phrases,hardware wallets,and secure backups; or else self custody preserves ⁣sovereignty.
  • Amount and access needs: Large long-term holdings often justify extra effort for⁤ cold storage; frequent trading or ‌fiat rails may favor custodial accounts.
  • Regulatory​ and ​recovery requirements: if you need ​formal account statements,⁢ compliance support, or insured custody, custodial providers can deliver those services.
  • Operational continuity: For teams, businesses, or multi-user access, custodial⁣ or custodial-like institutional solutions can simplify shared access and recovery workflows.
Factor Prefer Custodial Prefer Self Custody
Security model Insured/managed security You control private ​keys
Ease of use Simple onboarding & support Higher setup effort
Recovery Provider-assisted recovery User-managed backups

Practical rule: ⁣ for small, frequent-use balances or when you require fiat rails and customer support, custodial services are often appropriate; for long-term savings, large holdings, or maximum sovereignty, implement a robust self-custody strategy with tested backups and hardware‍ keys.

Q&A

Q: What does “custodial” mean in the context of custody and care?
A: “Custodial” relates to custody or the act of keeping and supervising something on behalf ⁤of ​others. Dictionaries define⁤ custodial⁣ as pertaining to custody or ⁣a custodian, involving protective‍ supervision​ and guardianship rather ‌than direct⁢ alteration or cure of the item in⁤ custody⁤ [[1]][[2]][[3]].

Q:​ what is a custodial wallet for bitcoin?
A:⁤ A⁢ custodial wallet is a service ⁢in which a third party (such as an exchange, custodial service provider, or financial institution) holds and manages the private keys that control bitcoin ​on ‍behalf of users. Users typically access and transact with their bitcoin through the provider’s ​interface,while the provider retains technical custody of the assets.

Q: How does a custodial wallet differ from a noncustodial wallet?
A: In a custodial wallet, the​ provider holds the private keys and is responsible for storage,⁤ security, and transaction signing.In a noncustodial wallet, the user alone controls the private ⁢keys ⁢and is responsible for securing backups and authorising transactions. Custodial services shift custody and operational responsibility from the user to the provider.Q: what are​ the primary advantages of using a custodial wallet?
A: Common advantages include convenience (easy account recovery⁢ and user interfaces), integrated services​ (trading, staking, fiat ⁢on/off ramps), professional custody​ infrastructure (multi-user access, institutional custody solutions), and reduced personal responsibility for ⁣key management.

Q: What are ‍the main risks and disadvantages?
A:⁤ Risks include counterparty risk (the provider may become insolvent, be hacked, or act maliciously), limited ​control (users⁢ cannot directly access private keys), regulatory ‍or custodial actions (assets may be frozen), and potential privacy trade-offs (providers may​ collect user data).

Q: How do custodial providers secure ⁢users’ bitcoin?
A: providers typically use industry practices such as cold storage (offline keys), multi-signature arrangements, hardware security modules (HSMs), strict operational controls, and regular audits. The exact ⁢security measures vary by provider; users should⁤ evaluate a ​provider’s published security practices and audit reports.

Q: Can custodial ‍wallets ⁢be insured?
A: Some‌ custodial providers ⁢purchase​ insurance to cover certain risks (for example, theft from online storage). Insurance coverage and terms​ vary widely, and insurance does not eliminate counterparty​ or regulatory risk.⁤ Users should ​review policy scope, limits, exclusions, and claims ‍procedures.

Q: What happens if I lose access to my custodial account?
A: Custodial providers usually offer account recovery processes based on identity verification, email/phone recovery, and support workflows. Because ⁢the provider controls the‌ private keys, they can typically restore account⁣ access if the user follows ⁣required procedures, unlike noncustodial setups where lost keys can ⁢mean permanent loss of funds.

Q: Are custodial wallets regulated?
A: Many custodial providers operate under financial and money-transmission regulations in their jurisdictions and must comply with ⁣anti-money-laundering (AML) and​ know-your-customer (KYC) rules. Regulatory status and protections vary by jurisdiction and provider.

Q: How should I⁤ evaluate and choose a custodial provider?
A: Key factors include security practices and audits, regulatory compliance and licenses,⁢ insurance coverage, reputation and track record, transparency of custody arrangements, user controls ⁢and withdrawal policies, ⁣fees, ⁢and customer support responsiveness.Q: When is a custodial wallet a reasonable choice?
A: Custodial ​wallets are often suitable for users⁣ who prioritise⁤ convenience, integrated services, easier account recovery,⁣ or professional custody for large holdings. They can also be appropriate for institutions or less ​technical users who prefer a⁤ managed custody solution.

Q: When​ might a‌ noncustodial wallet be preferable?
A: Noncustodial wallets are preferable for users who prioritise full control ‌over private keys, maximum privacy, and reduced counterparty risk. They are suited to people comfortable with key management,backups,and self-custody responsibilities.

Q: Can I move bitcoin between custodial and⁢ noncustodial ‍wallets?
A: Yes. bitcoin can be transferred from a custodial wallet to a ‍noncustodial wallet and vice versa by initiating on-chain transactions. ‍Transfers are subject to network ​fees ​and any ​withdrawal ​or deposit policies the custodial provider enforces.

Q: What are practical ​steps to reduce risk when using custodial wallets?
A: Use reputable‍ providers with transparent security and compliance practices; enable strong account protections (2FA, hardware ‌security keys where supported); diversify holdings across custody methods if appropriate; understand the provider’s withdrawal and custody‍ terms; and review insurance and audit facts.

Future Outlook

custodial bitcoin wallets-where a third party holds and manages private keys on a user’s behalf-offer clear conveniences such as simplified‌ user experience,account recovery options,and regulatory support,but⁣ they‍ also introduce counterparty,privacy,and custodial risks ‍that users ⁢must accept or ‌mitigate. The term “custodial” itself denotes responsibility‍ for taking care of another’s assets or rights, underscoring that custody transfers control away from the individual to a stewarding‌ service [[3]] (and in legal contexts can‍ carry implications similar to ⁤other ​forms of custody) ⁢ [[1]]. Choosing a custodial wallet should therefore be an intentional decision: evaluate the provider’s security ⁣record, transparency, insurance and ⁤regulatory posture, and withdrawal terms; consider whether the trade-offs align with your threat model;‍ and, ‍where appropriate, combine custodial services with non-custodial solutions to balance ‌convenience and control. Ultimately, informed diligence-not convenience alone-should guide whether you entrust a third party with your bitcoin.

Previous Article

How to Sell Bitcoin: Exchanges, P2P, and ATMs

Next Article

When Was Bitcoin Created? Origins in 2008-2009

You might be interested in …

Is Transaction Fee Mining Broken? – Ethex –

Is Transaction Fee Mining Broken? – Ethex – For a number of reasons, transaction fee mining has gained a negative reputation within the cryptocurrency space. In this article, we’ll explore why this model has failed […]

Crypto games conference 2019 – crypto daily™

Crypto Games Conference 2019 – Crypto Daily™

Crypto Games Conference 2019 – Crypto Daily™ The Crypto Games Conference (CGC) 2019 is coming soon which is set to be one of the biggest blockchain gaming event in the world. The Crypto Games Conference […]

Billion-Dollar South Korean Firm Goes into Blockchain

Billion-Dollar South Korean Firm Goes into Blockchain South Korean firm, Kolon Group, will begin exploring the use of blockchain among several of its subsidiaries for land registration, rent payment, and others, according to FnNews, February […]