Bitcoin Forum
May 29, 2024, 09:30:17 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [Proposal]2 Factor Authentification via email / mobile  (Read 414 times)
Andrew1337 (OP)
Sr. Member
****
Offline Offline

Activity: 574
Merit: 255


View Profile
July 05, 2017, 08:35:49 AM
 #1

Hi . I want to propose adding 2 factor authentification through email or mobile so we can avoid stolen accounts / hacked accounts .
So each member who logg in needs to confirm first time from email or mobile , but I think is more easier from email because confirmation from  mobile needs paid numbers , hosting etc .
I travell so much so I am logging from new devices / public computers so I am afraid my account could be stolen one day .

Thanks for your time, I hope you agree my proposal Smiley
Have a great day !
hilariousandco
Global Moderator
Legendary
*
Online Online

Activity: 3822
Merit: 2634


Join the world-leading crypto sportsbook NOW!


View Profile
July 05, 2017, 08:50:09 AM
 #2

Several 2-factor options are coming with the new forum (whenever that may be).

Use a safe proxy or vpn if you're worried about having your stuff stolen.

  ▄▄███████▄███████▄▄▄
 █████████████
▀▀▀▀▀▀████▄▄
███████████████
       ▀▀███▄
███████████████
          ▀███
 █████████████
             ███
███████████▀▀               ███
███                         ███
███                         ███
 ███                       ███
  ███▄                   ▄███
   ▀███▄▄             ▄▄███▀
     ▀▀████▄▄▄▄▄▄▄▄▄████▀▀
         ▀▀▀███████▀▀▀
░░░████▄▄▄▄
░▄▄░
▄▄███████▄▀█████▄▄
██▄████▌▐█▌█████▄██
████▀▄▄▄▌███░▄▄▄▀████
██████▄▄▄█▄▄▄██████
█░███████░▐█▌░███████░█
▀▀██▀░██░▐█▌░██░▀██▀▀
▄▄▄░█▀░█░██░▐█▌░██░█░▀█░▄▄▄
██▀░░░░▀██░▐█▌░██▀░░░░▀██
▀██
█████▄███▀▀██▀▀███▄███████▀
▀███████████████████████▀
▀▀▀▀███████████▀▀▀▀
▄▄██████▄▄
▀█▀
█  █▀█▀
  ▄█  ██  █▄  ▄
█ ▄█ █▀█▄▄█▀█ █▄ █
▀▄█ █ ███▄▄▄▄███ █ █▄▀
▀▀ █    ▄▄▄▄    █ ▀▀
   ██████   █
█     ▀▀     █
▀▄▀▄▀▄▀▄▀▄▀▄
▄ ██████▀▀██████ ▄
▄████████ ██ ████████▄
▀▀███████▄▄███████▀▀
▀▀▀████████▀▀▀
█████████████LEADING CRYPTO SPORTSBOOK & CASINO█████████████
MULTI
CURRENCY
1500+
CASINO GAMES
CRYPTO EXCLUSIVE
CLUBHOUSE
FAST & SECURE
PAYMENTS
.
..PLAY NOW!..
erikalui
Legendary
*
Offline Offline

Activity: 2632
Merit: 1094



View Profile WWW
July 05, 2017, 10:33:03 AM
 #3

Yeah please, we need this. Too many accounts are getting hacked and plus due to the earlier DDoS attack, all the emails too are exposed due to which so many times even I've received phishing emails as well as messages on this forum and I'm scared about my account too. Setting secondary password it seems makes the account more vulnerable?

The new forum will take over 12-13 years to come as someone proposed 2030.

Joel_Jantsen
Legendary
*
Offline Offline

Activity: 1890
Merit: 1310

Get your game girl


View Profile
July 05, 2017, 12:39:30 PM
 #4

Yeah please, we need this. Too many accounts are getting hacked and plus due to the earlier DDoS attack, all the emails too are exposed
Was it really due to the Ddos attack ?  Roll Eyes
From my understanding, DDos attacks don't breach data or leak information as the are only intended to overload the servers.
The data breach certainly just wasn't a Dddos but a planned hack through BitcoinTalk’s ISP provider (that's what I know and I could be wrong )

mocacinno
Legendary
*
Offline Offline

Activity: 3402
Merit: 5004


https://merel.mobi => buy facemasks with BTC/LTC


View Profile WWW
July 05, 2017, 12:49:16 PM
 #5

Yeah please, we need this. Too many accounts are getting hacked and plus due to the earlier DDoS attack, all the emails too are exposed
Was it really due to the Ddos attack ?  Roll Eyes
From my understanding, DDos attacks don't breach data or leak information as the are only intended to overload the servers.
The data breach certainly just wasn't a Dddos but a planned hack through BitcoinTalk’s ISP provider (that's what I know and I could be wrong )



Don't realy remember how the hackers succeeded in getting their hands on a database dump, but you're 100% correct about DDos'ing...
Even a DDos using a huge botnet will not lead to a data leak.

It's right there in the name: Distributed Denial of Service... Basically, and attack that's aimed at hurting a company by sending so much requests using a distributed system that the service becomes unavailable Wink

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
erikalui
Legendary
*
Offline Offline

Activity: 2632
Merit: 1094



View Profile WWW
July 05, 2017, 07:10:10 PM
 #6

Yeah please, we need this. Too many accounts are getting hacked and plus due to the earlier DDoS attack, all the emails too are exposed
Was it really due to the Ddos attack ?  Roll Eyes
From my understanding, DDos attacks don't breach data or leak information as the are only intended to overload the servers.
The data breach certainly just wasn't a Dddos but a planned hack through BitcoinTalk’s ISP provider (that's what I know and I could be wrong )



Not due to it but during that time there was a hack and I remember theymos was giving some reward to identify the hacker.

Bitcoin Talk: In May 2015, the Bitcoin forum Bitcoin Talk was hacked and over 500k unique email addresses were exposed. The attack led to the exposure of a raft of personal data including usernames, email and IP addresses, genders, birth dates, security questions and MD5 hashes of their answers plus hashes of the passwords themselves.

Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Passwords, Security questions and answers, Usernames, Website activity

Source: https://haveibeenpwned.com/

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!