Sign-in flow
The sign-in process often begins with a username or email and a password. For users who pair their account with a hardware device such as a Trezor, the device will be prompted to confirm certain actions. The hardware device acts as a secure enclave: private keys remain on the device and never leave it. The device will display transaction details or authentication prompts on its screen; the user must physically approve them. This physical approval step ensures that even if your computer is compromised, an attacker cannot perform transactions without your presence and confirmation.
Detailed steps
- Enter your registered email address or username in the designated field.
- Enter your account password. Use a strong, unique password not used elsewhere.
- If 2FA is enabled, provide the second factor (TOTP code, hardware key, or push approval).
- If required, connect your Trezor device and verify the prompt shown on the device's screen.
- After successful verification, you will access your dashboard. Always verify the destination and the device prompt before approving.
Bilingual line: यहाँ टेक्स्ट दिखाई देगा — text show hona chahiye — اور متن دکھائی دینا چاہیے
Security rationale
Combining something you know (password) with something you have (hardware device) creates a robust defense. A hardware device confines private keys to a secure element and requires a physical action for signing, which prevents remote attackers from performing unauthorized transactions. Two-factor authentication provides an extra layer should your password be compromised.