Daily Web3 Headlines You Need To Know
15 August #NFT #Developers #DeFi&Trading #Policy&Law
🖼 NFT
NFT games have edge over ‘money in, no money out’ games: Polygon’s Urvit Goel
Polygon的Urvit Goel:NFT游戏比 “赚钱,不花钱” 游戏更有优势
Polygon’s vice president of global business development for gaming, Urvit Goel, believes games that integrate nonfungible tokens (NFTs) have a natural edge on traditional games that don’t allow users to sell their in-game items.One of the main arguments Goel made is that the traditional business model that NFT games are competing against may be inherently weaker. In traditional gaming, users typically buy in-game items with real money, but they cannot sell those items to get back any United States dollar value…(Read More)
🔗 Developers
Introducing Coinbase Security Prompt — a safer and easier way of signing into Coinbase
介绍 “Coinbase安全提示”——一种更安全、更简单Coinbase的登录方式Coinbase requires all Coinbase accounts to use 2-Factor Authentication (2FA). 2FA is a security layer on top of username and password. Accounts with 2FA enabled require users to provide their password (first “factor”) and a 2FA code (second “factor”) when signing in. While Coinbase offers both hardware key and authenticator app support on both web and mobile for 2FA, many customers appreciate the convenience of SMS…(Read More)
Celestia: Launching a blockchain to be as easy as deploying a smart contract
Celestia:启动区块链与部署智能合同一样容易
Developers and communities will be able to deploy their own sovereign, custom-made blockchains at the “click of a button” says Celestia co-founder Ismail Khoffi…(Read More)
📈 DeFi & Trading
AscendEX Lists Lovely Inu (LOVELY), a DeFi Meme Platform
AscendEX将一个DeFi的迷因平台Lovely Inu(LOVELY)上架
Lovely Inu (LOVELY) is a decentralized meme-based blockchain platform that aims to bring a frictionless return, non-fungible tokens (NFTs), decentralized exchanges (DEXs), and much more to users. Lovely Inu is part of the meme token revolution. The project is dedicated to bringing cryptocurrency to mainstream audiences as a one-stop solution. The new DeFi protocol developed an infrastructure where users can trade various cryptocurrencies…(Read More)
Shiba Inu eyes 50% rally as SHIB price enters ‘cup-and-handle’ breakout mode
随着SHIB价格进入“杯子与杯柄”突破形态,Shiba Inu预计将上涨50%
Shiba Inu (SHIB) broke out of its prevailing cup-and-handle pattern on Aug. 14, raising its prospects of securing additional gains in the coming weeks.A cup-and-handle appears when the price falls and rises in a U-shaped trajectory in the first stage, followed by a swift move sideways or downward in the second. Notably, the price trend develops under a common resistance level…(Read More)
⚖️ Policy & Law
UN Agency Slams Crypto Adoption
联合国机构抨击加密货币的采用
The United Nations Conference on Trade and Development (UNCTAD) believes the impact of cryptocurrencies should be limited in developing nations. According to the agency, digital assets are unstable financial products that could cause further issues to already shattered economies…(Read More)
🔍 Learn
#2FA #Security
Users supply two distinct authentication factors as part of a security procedure known as two-factor authentication (2FA), also known as two-step verification or dual-factor authentication.
A user’s credentials and the resources they can access are both better protected with the implementation of 2FA. When compared to authentication techniques that rely on single-factor authentication (SFA), where the user only contributes one factor, usually a password or passcode, two-factor authentication offers a better level of security. Users must provide a password as the first factor and a second, distinct factor, typically a security token or a biometric factor like a fingerprint or facial scan.
By making the authentication process more difficult, two-factor authentication offers an extra layer of protection.
What Are Authentication Factors?
There are various forms of two-factor authentication in use today; while some may be more powerful or intricate than others, all provide better security than passwords alone.
- Hardware Tokens
Hardware tokens, which are possibly the earliest type of 2FA, are small, like a key fob, and they generate a new numeric code every 30 seconds. When a user attempts to access an account, they quickly scan their device and type the 2FA code that appears into the website or mobile app again. Other iterations of hardware tokens transmit the 2FA code automatically when connected to a computer’s USB port.
2. SMS and voice-based
SMS-based 2FA communicate with the user’s phone directly. The website asks the user for a login and password before sending a one-time passcode (OTP) through text message. Similarly, voice-based 2FA automatically dials a user and verbally delivers the 2FA code. While not common, it’s still used in countries where smartphones are expensive, or where cell service is poor.
3. Software Tokens
Instead of sending an SMS code, the new Coinbase Security Prompt sends users a push notification to their Coinbase mobile app, asking if they are trying to sign in. The most widely used type of two-factor authentication makes use of a computer-generated, one-time passcode that is time-based (also called TOTP, or “soft-token”).
A user’s desktop or smartphone must have the free 2FA app downloaded and installed. Any website that accepts this kind of authentication will then be able to utilise the app. The user signs in by first entering their username and password, and when requested, they enter the code that is displayed on the app. The soft-token normally has a validity period of less than a minute, just like hardware tokens. Additionally, soft-tokens eliminate the possibility of hacker eavesdropping because the code is generated and presented on the same device. With regard to SMS or voice delivery, it is a major concern.
🔥 Events
👋 About us
We believe in fair education for everyone to form your own opinions.
We aim to cultivate the ethical use and mass adoption of blockchain technology.