COCO is built from the ground up with security in mind. All traffic is encrypted and authenticated end to end using a custom security protocol developed primarily for peer-to-peer networks. We developed this protocol and its implementation in collaboration with a 3rd party partner security consulting company. The protocol has also been scrutinized for penetration testing by independent 3rd parties.