Security
WebMoney Transfer technology invented taking into account modern safety requirements for information management systems over the Internet. To ensure a high level of data and money protection there is a set of measures which effectiveness is confirmed by many years practice of trouble-free operation of the system.
Here is some of the security measures applied in the system.
To enter the program WM Keeper you should know the unique 12-digit WM identifier of user, a personal password (assigned by the user) as well as the location of the files with the secret key and purses in the computer's memory.
The system architecture eliminates unauthorized access to WM-purses and doesn’t allow performing calculations using WM-purses with no money on account (this is a lack of protection in payment by credit card system ).
All the transactions in this system – saving WebMoney on purses, invoices, payments between the parties, messaging - are committed in encrypted form, using the algorithm of information security, similar to RSA with a key length of 1040 bits. For each session a unique session key is used what provides the confidentiality of transactions and information exchange.
In order to connection failure, stability is provided at the system level . If an operation was not completed successfully, it is not taken into account by the system. When making the transaction, the funds are always either on the sender's WM-purse or on a WM-purse of the recipient. Intermediate status does not exist in the system. Thus, there is no such a situation where WM-funds are lost.
For more reliable operation with your electronic money we recommend you to use special programs for data encryption. One of the most important elements of the security system is a file with keys, nobody can get access to your accounts without it, that’s why it must be stored separately from all the data. You can download the free software (DekartPrivateDisk or BestCrypt), which allows you to create encrypted logical drives using modern methods of cryptography.
In addition to the built-in technology devices in a system supported by additional services, which the users configure their own. Read more about them you can find on the site WebMoney in "Security" section