Official Gateway

Binance Official Site Lookup

From the KYC document upload system's encrypted transport, Jumio/FaceTec data retention periods, EU GDPR compliance, and the right to data deletion, to how imposter sites steal document images — we dissect the personal-data processing pipeline behind the Binance official site and the user self-protection measures.

When most people think about the Binance official site, they only care about "can it open" and "is it real". Very few ask: the front and back of my ID, holding-ID photos, and liveness video that I uploaded — where are they stored, for how long, and whether they are shared with third parties. This layer is actually the true threshold for deciding whether to hand over your documents to the site. The real main domain is binance.com; the access entry and download channels are at Binance Official Site. Users about to onboard and go through KYC can tap register free first, then read this article for the privacy highlights — avoiding handing your documents to imposter sites.

1. The Binance KYC Upload Data Flow Is Split Into Four Stages

Many users assume "uploading to Binance" is a simple HTTP POST. In reality, from the moment you click "Choose File", your ID image passes through four different processing systems.

Stage 1: From Browser/App Client to CDN Edge Node

Binance's KYC upload entry runs on the accounts.binance.com subdomain, fronted by a fully managed Cloudflare Enterprise CDN. TLS 1.3 is mandatory between client and edge, with TLS 1.0/1.1 disabled; the certificate uses ECC P-256. So even on hotel or café Wi-Fi, the ID image is encrypted at the link layer, and a man-in-the-middle only sees ciphertext.

To judge whether you are on the real upload channel, click the padlock in the address bar to view the certificate chain. The Issuer should be DigiCert's OV certificate, and the O field in the Subject is Binance Holdings Limited. Imposter sites often use free Let's Encrypt DV certificates with only a CN and no organisation — a visible tell.

Stage 2: From Edge Node to Object Storage

After passing through the CDN, images do not land on business servers but go directly to object storage. Binance publicly discloses AWS S3 (regions ap-northeast-1 Tokyo and eu-west-1 Ireland) for APAC and European data-localisation. Every ID image undergoes KMS envelope encryption at storage time, with an object-level key salted by the user's UID.

Two details matter at this stage. First, the bucket is set to "deny public list" — anyone without a signed URL cannot fetch the image. Second, every backend access to this bucket leaves a CloudTrail audit log retained for seven years. Even Binance's own employees accessing your ID image leaves a record.

Stage 3: KYC Vendor Processing

Binance does not perform OCR and liveness in-house but outsources to licensed KYC vendors — currently Jumio (ID OCR and document authenticity) and FaceTec (3D liveness).

  • Jumio's data centres are in Dallas (US) and Dublin (Ireland), ISO 27001 and SOC 2 Type II certified.
  • FaceTec does not persist images — it only retains 3D face maps (generated by irreversible algorithms), and EU region user requests are processed via Frankfurt AWS nodes.

Privacy implication: your ID images are seen not only by Binance but by at least one third-party processor. The vendor has a Data Processing Agreement with Binance — under GDPR, Jumio is the processor and Binance the controller, so you can assert controller responsibilities against Binance.

Stage 4: Internal Retention and Archival

After initial review, original ID images do not stay in hot storage forever. The disclosed policy: normal accounts retain for 5 years (per EU AMLD5 and Singapore MAS), destroy 5 years after account closure, frozen high-risk accounts can retain up to 10 years for judicial cooperation.

Five years is a key number. Even if you close your account today, your original ID remains lawfully retained until after 2031. Earlier deletion requires the data-deletion request channel below.

2. How the Five User Rights EU GDPR Grants Apply at Binance

Binance European entities (Binance France SAS, Binance Italy S.r.l., etc.) are GDPR-applicable. Even if you do not live in the EU, as long as your account is under a European entity (EU-27 address), these five rights apply.

Right 1: Right of Access

You can request a copy of all personal data on your account, including ID images, KYC questionnaire answers, login IP list, device fingerprints, and trading records. Submission: in account settings, open Privacy → Data Subject Access Request. The official SLA is 30 days; in practice you typically receive an encrypted-archive download link within 10–14 days.

Right 2: Right to Rectification

If you find an item is wrong (address typo, misspelled English name), you can request correction. Usually merged with the regular profile edit entry, but core fields like ID number require re-KYC.

Right 3: Right to Erasure ("Right to Be Forgotten")

The most misunderstood. GDPR requires the controller to delete data when "the processing purpose is achieved" or "the user withdraws consent". But AML retention obligations take precedence. You can submit the deletion request, but ID images and trading records for compliance are retained until statutory ages expire. What can be deleted immediately: marketing preferences, device push tokens, cookie data, customer-support chat — "non-compliance-mandatory" data.

Correct expectation: Right to erasure ≠ instant evaporation, but lockbox until statutory age ends.

Right 4: Right to Data Portability

You can request structured, machine-readable exports (usually JSON or CSV) for transfer to other providers. Trading records and fund flows can be obtained via this channel.

Right 5: Right to Object

You can object to automated processing based on "legitimate interest" — e.g. risk-model behaviour profiling. Practical impact: after objecting, some features (credit card channels, large OTC channels) become unavailable because risk control degrades to manual mode.

3. How Imposter Sites Steal and Resell ID Images

Knowing how the real site processes data, the risk of imposters becomes stark.

Where Imposter Sites Put the Data

Typical structures observed:

  • Bare-metal forwarding: front-end HTML cloned from real, backend on a cheap VPS (Vultr Tokyo, DigitalOcean Singapore), ID images written to local disk and periodically bundled to Telegram channels.
  • Direct cloud-storage: using public AWS S3 or Alibaba OSS buckets, images unencrypted, filenames as user emails — bucket name known means content enumerable.
  • API-phishing: front-end pretends to upload to Binance, but JS redirects to api.binance-xxx.top, then resells to underground data dealers.

On underground data markets, a clean KYC set (ID front/back + holding-ID + selfie) quotes USD 400–800; with bank statements and proof of address, up to USD 2,000. Hand your documents to an imposter and they likely appear in some Telegram channel catalogue within a week.

Downstream Risks of ID Misuse

Observed downstream uses:

  • Registering accounts on other exchanges to complete KYC as money-laundering channels
  • Registering Revolut, Wise virtual bank cards for abuse
  • Opening stores on short-video platforms under stolen identities
  • Filing false police reports under your name leading to questioning

Once such issues occur, even proving innocence typically takes 6–18 months of remediation.

4. Six Operational Indicators to Identify the Real Binance KYC Entry

Six reverse-engineered checks into a user-actionable list — run through before uploading documents.

  1. URL main domain: must be exactly accounts.binance.com. Subdomains may prefix www but not login, verify, or auth.
  2. Certificate organisation: click the padlock; the O field should be Binance Holdings Limited or the full regional entity name.
  3. Page source: the KYC entry is only reachable from the logged-in account centre. Close any KYC page reached via email, SMS, or ad redirects.
  4. Privacy policy link: the real upload page's footer always links binance.com/en/privacy and names the data controller entity.
  5. Post-upload feedback: the real site returns a Jumio queue ID of the form 3xxx-xxxx-xxxx-xxxx; imposters return auto-incrementing numbers or simple messages.
  6. HTTPS response headers: in dev tools, strict-transport-security must exist with max-age ≥ 31536000. Imposters often lack this header.

5. Why the App Channel Has Cleaner Privacy

All risks from web upload are reduced via the app channel, for three reasons:

  • The app implements certificate pinning — MITM certificates do not take effect, and public Wi-Fi cannot hijack.
  • Camera data is handed directly to the FaceTec SDK inside the app — photos do not land in the gallery or system cache first.
  • The app requests a minimal permission set; photo permission can be granted per-use, and some Android systems support "only while using the app".

Android users not yet installed can visit Binance Official App to download the APK. iPhone users follow the iOS Installation Guide to switch region and obtain from the App Store. First-time KYC after install should be done on your trusted home Wi-Fi or cellular, not public networks.

6. The Practical Approach to Submitting a Data Protection Request (DSAR)

Here is the path to obtain all personal data Binance stores about you.

Materials to Prepare

  • Account email
  • UID
  • Valid ID (for identity verification to prevent impersonated requests)
  • Request type (Access / Rectification / Erasure / Export / Object)

Submission Channel

After login, Account → Privacy → Data Subject Rights → Submit Request. European users can additionally email [email protected] — the mandatory DPO contact required by GDPR.

Response Times

  • Right of Access: typically an encrypted archive in 10–14 days, link valid for 7 days
  • Right to Erasure: non-essential processing stops immediately after submission; compliance-required data enters "restricted processing" until ages expire
  • Data portability: JSON/CSV export in 15–21 days

Remedies If Rejected

If you feel a request is unreasonably rejected, complain to the relevant regulator:

  • French users: CNIL
  • Italian users: Garante per la Protezione dei Dati Personali
  • Other EU users: the local data protection authority
  • Asian users: Singapore PDPC or Hong Kong PCPD

Binance typically handles before regulator intervention, since penalties are 4% of global revenue — far exceeding cooperation cost.

7. Four Self-Protection Steps Before Upload

Beyond choosing the right site, several "self-hardening" steps during upload.

  • Put a visible watermark on the ID image: use a watermark app to overlay "For Binance KYC 2026-04" subtly — for later traceability if it leaks
  • Do not keep originals in cloud photos: after uploading, delete the document photos from the gallery and empty "Recently Deleted"
  • Dedicated email for exchanges: do not mix with social, shopping, or banking — reduces risk of email collision linking back to KYC
  • Enable login notifications and withdrawal whitelist: extend data-layer protection to the asset layer — set in Security Center with one click

FAQ

Q1: Can I refuse letting Binance pass my data to Jumio or FaceTec?

You can, but the consequence is KYC cannot complete, and account functions are restricted to deposits and withdrawals of existing assets. Binance lists these data processors in the privacy policy; agreeing at registration authorises this sharing. Individually withdrawing Jumio authorisation equals withdrawing KYC, typically downgrading the account.

Q2: I closed a Binance account in 2024 — are the documents still in their hands?

Likely. Retention policy keeps data for 5 years after closure for compliance. Documents from your 2024-closed account will be kept until 2029. You can submit a DSAR via the DPO email to confirm the destruction schedule; early destruction is not possible before compliance retention ends.

Q3: Is data shared between European Binance (Binance France) and global binance.com?

Legally separate. Binance France is an independent legal entity, registered in France under CNIL supervision; the global version is operated by Binance Holdings Limited. User databases are technically isolated in the backend, and accounts cannot cross-merge. But if you first registered globally and migrated to European, historical data undergoes a compliance migration, with both sides retaining copies until statutory ages.

Q4: If an imposter site already has my ID, what can I do?

Immediately do three things: report the ID as lost at a police station (leaves a record for future misuse defence); enable "identity verification alerts" on common credit platforms; proactively re-initiate KYC on your Binance account and set the anti-phishing code — if the attacker tries registering with your ID, the risk system flags historical similarity.

Q5: Is there a substantive privacy difference between doing KYC via app vs. browser?

Yes. The app uses certificate pinning — MITM cannot intervene during transport. The browser only has HSTS, which may still be decrypted in some enterprise-proxy environments. The app's camera permission is iOS/Android system-level minimum; the browser requires full camera access, and malicious extensions can secretly capture. Overall, app privacy surface is smaller than browser.

Q6: Does the anti-phishing code directly protect KYC data?

Not directly — it protects "email authenticity recognition", not the document upload channel. But it is a companion signal: if a "KYC supplementary materials email" lacks the anti-phishing code you set, you can judge it as forged and avoid the phishing link that would have uploaded documents to an imposter. Combining anti-phishing code, 2FA, and withdrawal whitelist covers both data and asset lines.

If you also want to finalise account security before uploading, return to the Category Navigation and continue with "Account Security Essentials" and "Phishing Site Identification".

Keep reading

Still have Binance questions? Head back to the category page for more tutorials on the same topic.

Categories

Related tutorials

What are Binance Mirror Domains? 2026 Latest List & Connectivity Testing 2026-04-10 Binance PC Web vs. Mobile H5: What are the Differences? A Feature Comparison 2026-04-10 How to Identify Binance Phishing Sites? 5 Features + Real Fake Cases 2026-04-11 What's the Difference Between binance.com/.us/.jp? Detailed Comparison of National Sites 2026-04-12