Frequently Asked Questions

Find answers to common questions about Chainberry

What blockchains does Chainberry support?
Chainberry currently supports Bitcoin, Ethereum, BNB Chain, TRON, Solana, and Polygon. We're continuously working to add support for more blockchains based on client demand.
Do you manage client funds?
No, Chainberry is a non-custodial technology provider. We provide the infrastructure and tools for businesses to manage their crypto operations, but we do not hold, manage, or access user funds at any time.
What is the pricing model?
Our pricing model is simple and transparent: approximately 0.5% per transaction, with no setup fees or monthly minimums. Volume discounts are available for enterprise clients.
How do I integrate with Chainberry?
You can integrate with Chainberry using our REST APIs or React SDK. Detailed documentation and integration guides are available in our Developer Portal.
What compliance measures do you have in place?
We partner with Elliptic for Know Your Transaction (KYT) screening, which provides real-time wallet risk scoring and automated transaction rejection. We also implement end-to-end data encryption, GDPR-compliant practices, and role-based access control.
How long does it take to integrate Chainberry?
Most clients can integrate our solution and go live within days, not months. Our concierge onboarding process and developer-friendly SDKs and APIs make integration quick and straightforward.
Do I need a license to use Chainberry?
As a non-custodial technology provider, Chainberry operates from Saint Vincent and the Grenadines, where no Virtual Asset Service Provider (VASP) license is currently required. However, clients are responsible for ensuring their own regulatory compliance in their respective jurisdictions.
How secure is Chainberry's infrastructure?
We prioritize security at every level. We use Fireblocks for wallet management with multi-signature (MPC) security, Ledger for cold storage, and implement comprehensive security measures including end-to-end encryption, role-based access control, and regular security audits.