Trust & compliance

KYC / AML Policy

SkolX is a connector that helps verified people and businesses find each other for peer-to-peer settlement. This page explains how we use identity verification and anti-money laundering controls to keep the network safe.

Consumer & BusinessTiered verificationRisk-based controlsPrivacy-aware

Last updated: 2/13/2026

Overview

SkolX uses a risk-based approach to KYC (Know Your Customer) and AML (Anti-Money Laundering). Our goal is to keep exchanges safe, reduce fraud, and support compliant operations across corridors.

  • We verify users and businesses before enabling higher-value or higher-frequency activity.
  • We apply behavioral risk signals to detect suspicious patterns.
  • We may request additional information where required by risk, partners, or regulations.
SkolX is designed as a connector. Where required, we work with licensed partners for certain rails (e.g., bank transfers, payout partners, or agent networks).

Why we do KYC/AML

Protect users
Reduce scams, impersonation, and unsafe meetups with verified profiles and controlled limits.
Prevent misuse
Detect fraud, money laundering typologies, and suspicious behavior using risk rules and monitoring.
Enable partners
Support integrations with banks/agents/regulated partners that require KYC and transaction traceability.
Build trust
Higher verification tiers unlock better matching, higher limits, and stronger reputation.

Verification tiers (example)

Verification is tiered. The exact thresholds may vary by corridor and partner requirements, but the structure below illustrates how SkolX manages risk:

Tier 1 — Basic
  • Email / phone verification
  • Low limits, limited matching options
  • Basic fraud controls
Tier 2 — Verified Individual
  • Government ID + selfie (liveness)
  • Higher limits, better matching
  • Reputation signals (ratings/history)
Tier 3 — Enhanced / Business
  • Business documents + beneficial owner verification (where applicable)
  • Higher limits, escrow access, business features
  • Additional monitoring and controls
We may require additional verification for high-value exchanges, unusual patterns, or escalations.

Checks we perform

  • Identity verification: ID capture, selfie/liveness check, and consistency checks.
  • Device & account integrity: device fingerprinting, duplicate account detection, and session security signals.
  • Trust & behavior: rating history, completion rates, dispute patterns, velocity, and anomaly detection.
  • Business verification: registration documents, authorized signatory checks, and basic ownership validation where required.

Data & privacy

We collect only what’s needed to verify identity, prevent fraud, and operate the platform safely. We protect your information with access controls, encryption-in-transit, and least-privilege processes.

  • We do not sell personal data.
  • We retain records only as long as required for operations, safety, and legal obligations.
  • For full details, see our Privacy Policy.
If you believe your data is incorrect or want to request deletion (where applicable), contact us using the details below.

Sanctions & PEP screening

Where required (by corridor, partner, or regulation), we may screen users and business principals against sanctions lists and politically exposed person (PEP) indicators. Matches may trigger enhanced due diligence, additional verification, or restricted access.

Ongoing monitoring

Verification is not a one-time event. We monitor activity for suspicious behavior and may:

  • Temporarily hold a transaction for review
  • Request additional information
  • Restrict or close accounts that violate policy
Velocity checks
Unusual frequency or rapid repeat transactions may be flagged.
Anomaly detection
Patterns that diverge from typical user behavior are reviewed.

Reporting & escalation

If we detect suspicious activity, we may take steps including restricting accounts and escalating to partners or relevant authorities where required by law. We also encourage users to report suspected scams or coercion immediately.

If you suspect fraud, do not proceed with an exchange. Use in-app reporting (when available) or email us.

Contact

For KYC/AML questions, verification issues, or policy requests:

Compliance & Support