Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
Non-custodial
It is a decentralized type-of-wallet, where the users owns its private keys.
zkOracle
A zkOracle is an advanced concept in blockchain technology that combines the properties of oracles with the principles of zero-knowledge proofs.
Token
Blockchain based unit of value issued by an organization, which grants token holders a right to participate in a network.
IYKYK
Abbreviation for: if you know you know. The phrase implies that the user has dropped some sort of insider knowledge about a specific experience. Often, the post will have some callback to a particular experience that will instantly stand out to those who are “in the know,” or ironically sharing commonly known information.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.