Pay via Eye connected with 2FA — your data has never been safer

AligatoCoin.io
aligatocoin.io
Published in
3 min readAug 15, 2018

Problems related to safety ensurance and data protection were never more important than now. We can hear a lot about the new methods of hacking identity or other attempts to steal our money. Modern hackers are really creative, they invent a lot of ways to make our life harder. On the other hand, a lot of entities like social services and banks are implementing new ways of protection to improve their security-level.

Combined passwords is not enough

Not so long ago, in the early 60’s, password inventing was perceived as a true revolution. Finally, someone discovered how to protect our data in a smart, easy, and affordable way. Initially, it was used only by a limited group of people but when the internet bubble has begun, it became a common tool used by every average internaut. For these times, it was a sufficient way to feel safe (as long as you haven’t picked the 12345 or admin-admin combination). But with growth of the whole internet-based business and the development of technology in general, even this kind of protection was insufficient.

Nowadays, when each one of us is fluently using the web, it’s no surprise that our accounts have become a magnet for hackers trying to steal our money or — more and more often — data.

It all started with password cracking — it’s based on recovering data that have been stored in or transmitted by a computer system. The most common way to break your securities is using a brute-force attack. It consists of an attacker trying out as many passwords or passphrases as possible with the hope of finding the match.

There are two ways of carrying out this method. The first one is based on a dictionary vocabulary being cross-checked with yet unknown password. The second one is based on the use of the most common phrases or combinations of letters and numbers. The brute-force attack requires a high computing power but nowadays, even average internauts use really strong machines, so as you can guess it’s not a problem for the more advanced users.

2FA as an extra layer of security

One of the most popular and common ways to protect our passwords is the use of Two-Factor Authentication. This method adds a special layer to your account by requesting approval in form of a code from an external source . There are 2 ways of using 2FA and they are very similar.

Both methods use a special code that you have to enter after successfully completing the first step of access. It can be delivered via text message or a third-party app. Using 2FA is really simple and it makes logging into your accounts by unauthorized persons much harder. Biggest disadvantages of using 2FA? Well, if you’re using a dedicated app that reveals one time pass-code on your display and you’ll lose your mobile phone, the effects might be really messy. The worst thing that might happen is the possibility of losing access your account. Moreover, if your mobile phone is out of battery, you won’t be able to log into your account.

Using the 2FA is significantly increasing your safety on the web. We think that connection of 2FA and our Pay via Eye technology makes it practically impossible to steal any of your digital possession. How will it work? We’re planning to implement the technology in the front camera of our drones. You can decide which kind of protection you’ll use. It might be just a password but we will give you an opportunity to use an unhackable method of payment and collecting goods. Imagine a world where everything happens automatically. You order a product, the drone delivers it just outside of your door and then verifies your identity. As you might have seen in AligatoCoin 2.0 Whitepaper, the core of our vision consist of drones delivery, AI and aforementioned PvE system. Use of blockchain as a ground for payments and data storage will make our system as safe as possible today. It’s not a very distant future and we believe that, with your support, we can be the company to look up to in the security aspects.

--

--