Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
zkOracle
A zkOracle is an advanced concept in blockchain technology that combines the properties of oracles with the principles of zero-knowledge proofs.
cc0 NFT
A cc0 NFT is a piece of digital content where the IP rights have been relinquished.
Wei
The smallest fraction of an Ether, with each Ether to 1000000000000000000 Wei.
Soft Cap
Targeted fund raising limit of an ICO
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.