ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
View Torrent Info: Shut.In.2016.HDCAM.x264 - Lesnar
View Torrent Info: Fantastic Beast and Where To Find Them 2016 HD-TS x264-CPG
View Torrent Info: Arrival 2016 HDCAM x264 AC3-TuttyFruity
Hot torrents
XVID DIVX
View Torrent Info: Sully.2016.BRRip.XviD.AC3-ETRG
View Torrent Info: Storks.2016.BRRip.XviD.AC3-EVO
View Torrent Info: The.Accountant.2016.HC.HDRip.X264.AC3-EVO
View Torrent Info: White.Girl.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: The.Accountant.2016.KOR.HDRip.1080p.H264.AAC-STY[EtHD]
View Torrent Info: Sully.2016.720p.BluRay.x264-SPARKS[EtHD]
View Torrent Info: Independence.Day.Resurgence.2016.BluRay.720p.DTS.AC3.x264-ETRG
View Torrent Info: Zootopia.2016.BluRay.1080p.AVC.DTS-HD.MA 7.1 x264-ETRG
Hot torrents
Television
View Torrent Info: Van.Helsing.S01E12.WEB-DL.x264-FUM[ettv]
View Torrent Info: Z.Nation.S03E12.WEB-DL.x264-FUM[ettv]
View Torrent Info: Gold.Rush.S07E08.Mega.Barge.and.Kid.Commando.HDTV.x264-CRiMSON[ettv]
View Torrent Info: The.Vampire.Diaries.S08E06.HDTV.x264-LOL[ettv]
View Torrent Info: Kahaani 2 (2016) Hindi 1CD Desi Cam x264 AAC - Downloadhub
View Torrent Info: Air Bud (1997) 720p HDTVRip x264 Eng Subs [Dual Audio] [Hindi 2.0 - English 5.1] -=!Dr.STAR!=-
View Torrent Info: Morgan 2016 720p BDRip Hindi DD 5.1 x264-SnowDoN
View Torrent Info: Ardaas (2016) DVDRIP 1CDRIP x264 AAC ESub [DDR]
30s
Chat
To add new messages please Login or Register for FREE
Warning! Stop Government from Tracking Your Torrenting!
Your IP Address is 54.161.208.7.   Location is United States
Your Internet Provider and Government can track your internet activity! Hide your IP and LOCATION with a VPN
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > Apple Introduced Two-Step Authentication

Apple Introduced Two-Step Authentication

Apple Introduced Two-Step Authentication

Added: Saturday, February 28th, 2015
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
The company finally switched to two-step authentication to better protect users of its iMessages and Face Time services on all Apple devices. This new security feature provides for additional protection against hacking. Now, after you have logged in with your usual name and password, you will be also asked to use a second security code to verify your account.
screenshot_8.png

Two years ago, the log in protection was added to Apple’s iTunes and iCloud accounts: this means that users who have previously logged into their device with Apple ID were already protected.Now the same is applied to two more of Apple’s services. In other words, if you log out of your Face Time or iMessage account and try to log in again, or log in on another machine, you will need a security code to confirm your identity. Thus, even if hackers get your username and password for the account, they still won’t be able to access it without the extra code.

However, critics say that Apple can do even more to secure user accounts. Security experts point out that two-step authentication (which is usually a message to a mobile device or a code-generating smartphone app) is not the same as fully-fledged multi-factor authentication. The latter normally relies on something that you know (a password) plus something that you have (a swipe card) or something that you are (a fingerprint).

In fact, many banks have been using card readers or numeric key fobs with security codes for a while now. But banks are more serious institutions that Internet sites like Facebook, Twitter and Google. Social networks normally just send the code to the phone number registered to the account. In other words, their two-step authentication is two sets of something that a user knows, though the ability to enter the SMS-based password depends only on their access to the text message, rather than on their ownership of the smartphone. The problem is that if the hackers manage to divert the calls or messages of that device, such two-step authentication will be subverted (and this already happened a few times).

As for the new Apple’s two-step authentication, the system uses codes sent via text message to a registered phone or the company’s Find My iPhone app. The company also pointed out that the user could associate more than one phone number to the account in case one of them is lost or stolen. Finally, a recovery key (the one that should be kept safe for emergencies) can also be used to log into the account instead of a security code.

Posted by:  SuperAdmin
Date:  Saturday, February 28th, 2015



Comments (3) (please add your comment »)

1
posted by ET junkieET loverTurtle (2015-02-28 06:46:08)
teethors avatarcorrect me f im wrong but i gues google mail have that, , great share

2
posted by (2015-02-28 19:52:49)
cggc avatargo to public you are safe in authentication so any who have hacking dedication can figure it out how hack with mathematics in this present edge of ideas of what it is so it amazing how public go to where is secure and that's the idea but tremendous idea for who hack and can be years of apple to have secure authentication so until now all go public without problems and in this present waiting for the next idea of secure devices like popular iphones etc...fix while open log in to nobody get data can be hard and it just for high tech so it real to be authenticated without problems and secure.

3
posted by (2015-03-01 10:40:43)
YourNumbr1Fan avatarMark these words: Windows will be asking for more than an email one day very soon, even when you set up a local account. They'll ask for a phone#, just like Google. Same with Apple. From that point, America will be like China.



Articles Search
Most Popular Stories
Articles Categories
Articles Tags


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc4