Important Tips To Secure Your Crypto Holding: The Use Of 2FA #002

in Tron Fan Clublast year

A5tMjLhTTnj4UJ3Q17DFR9PmiB5HnomwsPZ1BrfGqKbjdewwteBbxaQwG26hfJKNiQWyGhytpPsEHDR8TuxB6gp6TiL21PKa8zn4cFLcXKbrHpUA7AqoFJqbHVYMoi...qbD31P2EsTfKe2JRB5Ekh3bcfXUnxpJ6oHwqGJPwWTAy38vwNEL9nn6UGJLvNNqG8JwhvLpwp7bckyD4XAH1s6arrzzxE8Cp1hYLrwutpJgHPw154oMC8oeMu.webp
Source

Hello great minds,

It is a wonderful opportunity to come before you all today and I believe you are all doing perfectly fine as we join hands in promoting steemit on different social media platform, most especially twitter.

With a humble heart, I happily come before you all to discuss on an issue of great importance in the cryptospace.

In our last discussion, we learnt on how we can secure our crypto holdings by making use of 2FA, please carry along with me as we examine some unique details on 2FA.



METHODS OF TWO-FACTOR AUTHENTICATION



There are different methods of two-factor authentication that is being used in the cryptospace, each of them possesses their respective strength and weaknesses.

Explained below are some methods of two-factor authentication.

  • SMS AUTHENTICATION:

SMS authentication often involves the use of a user's registered mobile number.

Here, a one time code will be sent to the registered mobile number of a user and the user won't be able to gain access to his account without making use of this code.

A user needs this code alongside his password to gain full access to his account and without this two codes, he can't gain access to his cash.

Sms authentication although very easy to implement has some vulnerabilities such as sim swapping and Sim interception.

When done cautiously, a user will enjoy making use of this method of authentication.



HOW SMS AUTHENTICATION WORKS



Explained below are ways in which the sms authentication works

  • USER INITIATES LOGIN:

Here the user starts by inputing his username and password into the site he wishes to have access to.

  • SMS CODE GENERATION:

After a user has successfully entered his password and username, the system then generates a one-time unique code

  • SMS DELIVERY:

Here the system then delivers the generated unique code to the user's registered mobile number as an sms message.

Then the user receives it an then copy and paste it to the website within the allocated time.

  • CODE VERIFICATION:

After the code has been inputted, the system then verifies the code to see if it matches with the unique code sent via sms.

Then once it has been verified, a user can gain access into his account.



CONCLUSION



It is very important that we know about the operation of 2FA so we can better secure our account.

In our next discussion, we shall learn more about 2FA.
stay tuned

Sort:  

Important Tips To Secure Your Crypto Holding is a great post done by you.

Coin Marketplace

STEEM 0.18
TRX 0.16
JST 0.030
BTC 68481.33
ETH 2722.20
USDT 1.00
SBD 2.75