Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
Block Explorer
Application or websites which display information such as status of transactions or data contained in a block of a given public blockchain network.
Buy/Sell Tax
On-chain buy or sell tax rate where a percentage of the tokens bought/sold will be transferred to a set address.
Dump
A common term used to describe downward market movement, or to describe the action of selling an individuals holdings.
Immutable
A property characterized by inability to be change and stays unchanged over time.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.