Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
Satoshi
A unit measure for the smallest divisible unit of a bitcoin. 1 bitcoin is equal to 100 Million Satoshi.
Hey Hey Hey
A term made popular by Carlos Matos who was the spokesperson for the Bitconnect Ponzi. He used it frequently during Bitconnect events to rile up the crowd.
Non-Fungible Tokens (NFT)
They are collectible elements within the Ethereum blockchain under ERC-721, where each token refers to a single element with a certain value
Interoperability
Interoperability refers to the property of product/systems that are able to work with products/systems that are different without any restrictions.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.