Important Tips To Secure Your Crypto Holding: The Use Of 2FA #002
Hello great minds,
It is a wonderful opportunity to come before you all today and I believe you are all doing perfectly fine as we join hands in promoting steemit on different social media platform, most especially twitter.
With a humble heart, I happily come before you all to discuss on an issue of great importance in the cryptospace.
In our last discussion, we learnt on how we can secure our crypto holdings by making use of 2FA, please carry along with me as we examine some unique details on 2FA.
METHODS OF TWO-FACTOR AUTHENTICATION
There are different methods of two-factor authentication that is being used in the cryptospace, each of them possesses their respective strength and weaknesses.
Explained below are some methods of two-factor authentication.
- SMS AUTHENTICATION:
SMS authentication often involves the use of a user's registered mobile number.
Here, a one time code will be sent to the registered mobile number of a user and the user won't be able to gain access to his account without making use of this code.
A user needs this code alongside his password to gain full access to his account and without this two codes, he can't gain access to his cash.
Sms authentication although very easy to implement has some vulnerabilities such as sim swapping and Sim interception.
When done cautiously, a user will enjoy making use of this method of authentication.
HOW SMS AUTHENTICATION WORKS
Explained below are ways in which the sms authentication works
- USER INITIATES LOGIN:
Here the user starts by inputing his username and password into the site he wishes to have access to.
- SMS CODE GENERATION:
After a user has successfully entered his password and username, the system then generates a one-time unique code
- SMS DELIVERY:
Here the system then delivers the generated unique code to the user's registered mobile number as an sms message.
Then the user receives it an then copy and paste it to the website within the allocated time.
- CODE VERIFICATION:
After the code has been inputted, the system then verifies the code to see if it matches with the unique code sent via sms.
Then once it has been verified, a user can gain access into his account.
CONCLUSION
It is very important that we know about the operation of 2FA so we can better secure our account.
In our next discussion, we shall learn more about 2FA.
stay tuned
https://twitter.com/JuecoYoung/status/1705184722899419193
Important Tips To Secure Your Crypto Holding is a great post done by you.