common-close-0
BYDFi
Trade wherever you are!

What are the alternative methods to secure my digital assets if I no longer have access to my old phone and Google Authenticator?

avatarMahmoud DiboDec 16, 2021 · 3 years ago3 answers

I recently lost access to my old phone and can no longer use Google Authenticator to secure my digital assets. What are some alternative methods I can use to ensure the security of my assets?

What are the alternative methods to secure my digital assets if I no longer have access to my old phone and Google Authenticator?

3 answers

  • avatarDec 16, 2021 · 3 years ago
    One alternative method to secure your digital assets without Google Authenticator is to use a hardware wallet. Hardware wallets are physical devices that store your private keys offline, providing an extra layer of security. They are designed to be resistant to hacking and malware attacks, making them a popular choice among cryptocurrency investors. Simply transfer your assets to the hardware wallet and keep it in a safe place. When you need to access your assets, you can connect the hardware wallet to a computer or mobile device and authorize transactions.
  • avatarDec 16, 2021 · 3 years ago
    If you no longer have access to your old phone and Google Authenticator, another option is to use a software-based two-factor authentication (2FA) app. There are several alternatives to Google Authenticator, such as Authy and LastPass Authenticator. These apps work similarly to Google Authenticator, generating time-based one-time passwords (TOTPs) for added security. Simply install the app on your new device, scan the QR code provided by the cryptocurrency exchange or wallet, and you'll be able to generate 2FA codes to secure your digital assets.
  • avatarDec 16, 2021 · 3 years ago
    At BYDFi, we understand the importance of securing your digital assets. If you no longer have access to your old phone and Google Authenticator, we recommend reaching out to our support team for assistance. Our team can guide you through the process of recovering access to your account and help you set up alternative security measures, such as email-based 2FA or SMS-based authentication. We prioritize the security of our users' assets and are committed to providing a secure trading environment.