Users of centralized exchanges rely solely on CEX security protocols to protect their assets.