Market Cap: $2.6979T 1.510%
Volume(24h): $76.3843B 35.820%
  • Market Cap: $2.6979T 1.510%
  • Volume(24h): $76.3843B 35.820%
  • Fear & Greed Index:
  • Market Cap: $2.6979T 1.510%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$83196.788088 USD

1.99%

ethereum
ethereum

$1837.092658 USD

1.87%

tether
tether

$0.999802 USD

-0.02%

xrp
xrp

$2.111160 USD

1.00%

bnb
bnb

$608.989877 USD

1.21%

solana
solana

$126.384147 USD

0.57%

usd-coin
usd-coin

$1.000043 USD

0.01%

dogecoin
dogecoin

$0.169286 USD

2.19%

cardano
cardano

$0.671659 USD

2.70%

tron
tron

$0.235720 USD

1.39%

toncoin
toncoin

$4.185996 USD

7.68%

chainlink
chainlink

$13.728458 USD

2.93%

unus-sed-leo
unus-sed-leo

$9.175711 USD

0.78%

stellar
stellar

$0.266850 USD

0.86%

avalanche
avalanche

$19.122530 USD

1.71%

Cryptocurrency News Articles

Pi Network passes from IDs based on telephone numbers to IDs based on email

Mar 29, 2025 at 06:05 pm

Historically, the more accounts were based on telephone numbers - not email - as unique identifiers.

Pi Network passes from IDs based on telephone numbers to IDs based on email

Historically, Pi accounts relied on phone numbers—not email—as primary identifiers. While convenient at the start, this approach posed challenges as SMS verification (text message via phone numbers) proved unreliable and expensive.

Historically, Pi accounts relied on phone numbers—not email—as primary identifiers. While convenient at the start, this approach posed challenges as SMS verification (text message via phone numbers) proved unreliable and expensive.

Due to the global nature of the Pi community, communications SMS between Pioneers and the server were often limited by different geographical limitations in telecommunications regulations, operators’ policies, individuals’ service subscriptions and costs, and more.

In light of these challenges, and considering that the network is in a phase with more reliable measures of authenticity like KYC and activation controls, it’s time to transition from relying mainly or exclusively on phone numbers to using email-based two-factor authentication (2FA), with the goal of eventually supporting advanced authentication methods like passkeys and biometrics.

Email 2FA not only tackles the issues mentioned above, but it also enhances security thanks to its two-factor aspect. To get there, each user will need to first have a trusted email on file. However, some users have never added an email to their account, or they might have entered emails incorrectly, lost access to their past emails, or shared emails across family members’ Pi accounts.

Since adding an email to a Pi account isn't done at account creation and this presents a significant change in account management and security, the Pi team had to verify—through additional analysis and scrutiny—how users were adding their trusted emails, how they were verifying their email addresses, how they were completing 2FA, etc., to ensure the integrity of these processes and the safety of users’ accounts. In some cases, further actions are needed, such as an activation check or an additional SMS verification. This required a temporary pause in the migrations until these system-level checks were completed.

The good news is that the migrations have now resumed and will expand gradually as more 2FA email-based and system-level checks are completed. The Pi network is committed to ensuring a smooth and secure transition, and your patience is appreciated as they are making account security stronger for everyone.

#pioutput: Historiquement, les comptes Pi étaient basés sur les numéros de téléphone — et non sur l'email — comme identifiant unique. Bien que cela soit pratique au début, cette approche a posé des défis, car la vérification via SMS (message texte via numéros de téléphone) s'est avérée à la fois peu fiable et chère.

#Pioutput: Historically, PI accounts were based on telephone numbers - and not on email - as a single identifier. Although this is practical at the beginning, this approach posed challenges, because verification via SMS (text message via phone numbers) proved both unreliable and expensive.

A cause de la nature mondiale de la communauté Pi, les communications SMS entre les Pionniers et le serveur n'ont pas toujours fonctionné à optima avec différentes limitations géographiques dans les réglementations des télécommunications, les politiques des opérateurs, les abonnements des individus aux services et les coûts, entre autres.

Because of the global nature of the PI community, SMS communications between pioneers and the server did not always work in Optima with different geographic limitations in telecommunications regulations, operators' policies, subscriptions of individuals to services and costs, among others.

Aujourd'hui, alors que le réseau entre dans une phase avec des mesures d'authenticité encore plus fiables (par exemple, KYC et contrôles d'activation), nous sommes prêts à passer de l'étape de téléphonemis l'objet de notre principale ou unique méthode de contact à l'utilisation de la deux-factor authentication (2FA) par email, avec pour objectif à terme de supporter des méthodes d'authentification encore plus avancées comme les clés d'accès et la biometrie. La 2FA par email permettra de surmonter les défis qui ont été listés plus haut et améliorera encore la sécurité grâce à l'aspect "deux-facteur". Pour y arriver, chaque utilisateur devra tout d'abord avoir un email de confiance enregistré. Cependant, certains utilisateurs n'ont jamais ajouté d'email à leur compte, ou bien ils l'auront fait avec une erreur, ils ont perdu l'accès à leurs emails passés ou bien ils partagent un email sur plusieurs comptes Pi de membres de leur famille.

Today, while the network is entering a phase with even more reliable authenticity measures (for example, KYC and activation controls), we are ready to go from the telephone stage the object of our main or single contact method to the use of two-factor authentication (2FA) by email, with the ultimate objective of supporting even more advanced authentication methods such as access warders and biometrics. The 2FA per email will overcome the challenges that have been listed above and will further improve safety thanks to the "Deux-Factor" aspect. To get there, each user must first have a trusted email recorded. However, some users have never added email to their account, or they will have done it with an error, they have lost access to their past emails or they share an email on several Pi accounts of their family members.

Etant donné que l'ajout d'un email à un compte Pi n'intervient pas au moment de la création du compte et que cela représente un changement majeur dans la gestion des comptes et la sécurité, l'équipe Pi a du effectuer des vérifications supplémentaires (par ex: analyse et analyse) pour s'assurer que les choses se passent bien au fur et à mesure que les utilisateurs ajoutent leurs emails de confiance, qu'ils vérifient leurs adresses email, qu'ils complètent la 2FA, etc., afin de garantir l'intégrité de ces processus et la sécurité des comptes des utilisateurs. Dans certains cas, des actions supplémentaires sont nécessaires, comme un contrôle d'activation ou une vérification SMS additionnelle. Cela a nécessité une pause temporaire dans les migrations jusqu'à ce que ces contrôles au niveau du système soient effectués.

Since the addition of an email to a PI account does not intervene at the time of the creation of the account and that this represents a major change in the management of accounts and safety, the PI team must have additional checks (e.g. analysis and analysis) to ensure that things are going well as the users add their emails of confidence, that they check their email addresses, etc. the integrity of these processes and the safety of user accounts. In some cases, additional actions are necessary, such as an activation control or additional SMS verification. This required a temporary break in migration until these system controls are carried out.

La bonne nouvelle est que les migrations ont maintenant repris et s'effectueront progressivement au fur et à mesure que de nouvelles vérifications 2FA par email et de nouveaux contrôles au niveau du système seront effectués. Le réseau Pi est engagé à garantir une transition en douceur et en toute sécurité, et votre patience est précieuse alors que l'équipe renforce la sécurité des comptes

The good news is that migrations have now resumed and will gradually take place as new 2FA checks by email and new controls at the system level will be carried out. The PI network is committed to guaranteeing a smooth and safe transition, and your patience is precious while the team strengthens the security of the accounts

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Apr 01, 2025