Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
Satoshi
A unit measure for the smallest divisible unit of a bitcoin. 1 bitcoin is equal to 100 Million Satoshi.
Burned Tokens
Tokens which have been sent to addresses whose private key are not known, effectively becoming unusable.
opML (Optimistic Machine Learning)
opML (Optimistic Machine Learning) employs an optimistic verification mechanism and is able to handle large-scale machine learning models with billions of parameters efficiently, using fraud proofs that verify the ML computation.
Bearish
A term used to indicate negative sentiment towards the market or an asset, where investors believe that there will be downward price movement.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.