More about signing in
Signing in is more than typing an email and password. It's about creating a predictable, auditable experience that balances convenience with strong protections. When you sign in frequently from the same device, we rely on stable signals — such as device fingerprints and secure, rotating session tokens — to keep friction low while maintaining the integrity of your account. For unfamiliar or high-risk attempts, we add extra verifications like a one-time passcode delivered to your authenticator app or a prompt to confirm the attempt via an established device. This hybrid approach reduces false positives (unnecessary interruptions) while detecting real threats quickly.
How we handle passwords
Password security remains essential. We store only salted, iteratively hashed password digests and never keep plaintext copies. If we detect credentials from a known breach, we'll notify affected users and require a password reset. When choosing a password, prefer a passphrase — a sequence of words that are easy for you to remember but long and unique. Combine that with a second factor and periodic review to keep access controls robust.
Recovery and continuity
Reliable recovery options are key to avoiding account lockout. You should maintain an up-to-date recovery email, a trusted phone number for secondary verification, and at least one backup 2FA method (for example, backup codes or a hardware key). If you lose access to all recovery methods, recovery will be intentionally strict to prevent account takeover. That stricter path may require identity verification to restore access — a trade-off that protects account holders from unauthorized recovery attempts.
Protecting against scams
Scammers may attempt to trick you into revealing credentials via phishing pages, fake support agents, or malicious downloads. A few defensive habits make a big difference: always verify the URL in your address bar, never type your password into unsolicited pages or forms, and never share verification codes or recovery links. If a person claiming to be support asks for your password or a one-time code, treat it as a red flag and contact support through official channels listed on the site.
Final checklist
- Use a unique, strong password or passphrase.
- Enable two-factor authentication (authenticator or hardware key preferred).
- Keep recovery options current and add backup methods.
- Review active devices and sessions monthly.
- Report suspicious activity immediately.