CEX.IO News

CEX.IO strongly recommends Two-Factor Authentication

, February 11, 2014

On February 11th, 2014, CEX.IO Bitcoin Exchange implemented a phone verification feature with the Two-Factor Authentication. The decision to introduce this system aims to strengthen CEX.IO security system in general and increase safety of each member of CEX.IO continuously growing user base.

CEX.IO team believes that 2FA would significantly reduce online fraud occurrence, because users’ accounts will be secured not only with provided passwords, but also with additional pieces of information, which only users are informed about.

In order to pass 2FA, users are free to choose from two applications — Google Authenticator and Authy. Moreover, CEX.IO made a step towards unification of all users enabling 2FA not only for smartphone owners, but also for those, who use simple cell phones. Thus, people can either use up-to-date 2FA software or simply get a text or an audio message containing respective authorisation code.

Jeffrey Smith, CEX.IO Chief Information Officer, comments:

Users’ security and privacy are of the highest concern for us, especially since our platform deals with financial operations. Therefore, we instantly take measures on raising safeguard level at CEX.IO by means of introducing new security features, such as the Two-Factor Authentication, and informing our users about the ways of keeping their accounts safe from unauthorised access.

About CEX.IO:

CEX.IO is a Bitcoin Exchange, which has shared credentials with GHash.IO mining pool. This scheme allows users to trade Bitcoin mining power (GigaHashes per second) and mine Bitcoins simultaneously. Alternative crypto currencies, such as Litecoins and Namecoins also stand for trading at CEX.IO.

Related

CEX.IO News

CEX.IO to list BAT token

We are announcing the expansion of CEX.IO markets with a new asset — Basic Attention Token (BAT). BAT provides access to various advertising and attention-based services on Brave, a digital advertising platform powered by the blockchain. Once listed, BAT will be available for purchase using your Visa or Mastercard.

Jan 30, 2020 | 4 min read
CEX.IO News Education

What are Public and Private Keys?

Public key cryptography, also known as asymmetric cryptography, is a type of cryptographic algorithms that operate with the help of two separate keys — private and public keys. These two are different, but at the same time they are mathematically related to one another. The keys have unrelated functional

Oct 08, 2014 | 3 min read
CEX.IO News Education

Is Bitcoin Secure?

One of the main issues that has been holding back mass adoption of Bitcoin as a payment system and currency is the notion that it is not secure. There have been plenty of hacks and frauds in the Bitcoin ecosystem, so people who are unsure of the digital currency

Jun 13, 2015 | 5 min read