How the login flow works — step by step
Understanding the flow helps you spot anomalies and respond faster during incidents.
- Credentials entry: Enter email and password. Passwords are compared to protected hashes on the server — they are never stored in plaintext.
- Device and IP checks: The platform may run risk analysis (IP reputation, device fingerprint) and require extra verification if something looks unusual.
- Second factor: If 2FA is enabled, you’ll be prompted for a code from your authenticator app, a hardware key confirmation, or a secure push approval.
- Session creation: A secure session token is issued and stored in the browser/app. For high-risk actions (withdrawals, linking bank), you may need to re-authenticate or provide additional verification.