BitList
HomepageGitHubQuoraMediumThreads
  • 💡Introduction
  • 🛡️SAFETY BASICS
    • Safety Basics
      • Email
      • Two-Factor Authentication
      • Segregation
      • Mobile phone
      • SIM Card
      • Operation System
      • Browsers
      • Network
      • Password Manager
      • GPG
  • 📚GUIDES & TUTORIALS
    • Wallet Basics
      • Types of Wallets
      • Download
      • Back Up
      • If Lost or Hacked
    • About Privacy
      • Bitcoin Mixers
      • Private Exchanges
      • Creating a Mixer
      • Crackdown on Mixers
      • History of Bitcoin Mixers
      • Alternative to Mixers
      • AML
  • ℹ️Info & Sources
    • Interesting Resources
    • Info & Sources
      • List Bitcoin mixers
      • Privacy Tools
      • Everything about Bitcoin mixers
      • Bitmixlist Info
      • Scams Bitcoin mixers
      • List Crypto cards
      • Fees on Crypto Casinos
      • Blockchain selfguard Handbook
      • Free EU bank accounts online
      • Guide: Safe Сommunication
  • 🆗FRIENDLY RESOURCES
    • BitcoinCleanup
    • OrangeFren
    • BitmixList
    • BitcoinData
Powered by GitBook
On this page

Was this helpful?

  1. SAFETY BASICS
  2. Safety Basics

Two-Factor Authentication

In a centralized platform, you have to use 2FA. Anyone can access the centralized platform, and if your credentials get stolen, your account is breached and your fund will be lost. On the contrary, the password for your decentralized wallet is just a local authentication, even if the hacker gets the password, they still need to get access to the device where your wallet is located.

Now you see the differences?Some well-known two-factor authentication (2FA) tools include: Google Authenticator, Microsoft Authenticator, etc. Of course, if you use a password manager (such as 1Password), it also comes with a 2FA module, which is very handy. Always remember to make backups, because losing 2FA can be a hassle.

In addition, two-factor authentication can also be a broader concept. For example, when an account identifier and a password are used to log in to the target platform, our account identifier is normally an email or mobile phone number. At this time, the mailbox or mobile phone number can be used as 2FA to receive a verification code. But the security level of this method is not as good. For example, if the mailbox is compromised or the SIM card gets hijacked, or the third-party service used for sending emails and text messages is hacked, then the verification code sent also be revealed.

If you use Google Authenticator and have a spare older iPhone, duplicate all timecodes on the second device. Please note: If you are backing up on this device, make sure you do not have the "automatic app updates" feature enabled. If your phone is lost, you will be left with a duplicate timecodes. Of course, you can and should also write down the one-time backup time codes on a piece of paper and put them in a safe place.

PreviousEmailNextSegregation

Last updated 12 months ago

Was this helpful?

🛡️