Can we clear up some confusion about the difference between two-factor authentication and multifactor authentication, once and for all? Not only is two-factor security a type of multifactor authentication but it is far more practical than vendors of more expensive security tools want you believe. Continue reading
Things that look really simple from afar can turn out to be quite complex when you get up close — especially when you try to take them on yourself. Letting an expert do the work for you can not only save time and money but also give you better results. And that’s an understatement when it comes to implementing user authentication via SMS. Continue reading
Even when your app is still in the ideation phase, you are probably already starting to think about user onboarding and authentication. You know you need the ability to onboard users via their mobile device (both for authentication and to allow them to download the mobile app with ease). What you may be scratching your head on is which of the myriad solutions is right for your app.
The phone number is shared across an intimate spectrum of friends, colleagues and family — the uniqueness and longevity of the phone number, plus the intimate social graph make the phone number simply the best form of user identity. An SMS requiring a PIN code can authenticate ownership or identity pretty fast and easy. Continue reading
Phone numbers are the fastest, personal and most intuitive identity to use in the mobile era. And just as crucial, phone numbers are persistent and unique; they are unique across all networks, both on web and mobile from the internet to the telcos. Continue reading
These days, it is becoming very common to see new trendy apps implementing SMS verification in the app store arena. Continue reading