Skip to main content
How does Harpie 2FA work?
Daniel Chong avatar
Written by Daniel Chong
Updated over a year ago

Overview of how 2FA works

  • Transaction Scans: Each transaction is thoroughly scanned for security threats.

  • Alerts: If a transaction seems suspicious, Harpie alerts you and halts the process.

  • Wallet Integration: The 2FA system works with your current wallet without any need for extra downloads.

  • Notification Process: You'll receive an email to confirm any transaction that Harpie flags as potentially harmful, adding a protective pause that could prevent phishing scams.

  • Definition of Risk: High-risk transactions typically involve token transfers, approvals, or contracts that could result in financial loss. These may include interactions with known phishing entities, suspicious contracts, or wallets associated with cybercrime.

Operating on the Wallet's Network Layer

Harpie 2FA operates on the network layer of your wallet. Just like how you would switch between "Ethereum Mainnet" and "Polygon Mainnet," you use Harpie 2FA by switching to the Harpie 2FA network.

Harpie 2FA sits between your wallet and the blockchain at the network level. It scans outbound transactions from your wallet, notifying you if you are transacting with thieves, scammers, or other bad actors. (see: How does Harpie determine if I'm interacting with a crypto thief?)

Transaction Verification

When Harpie 2FA flags a transaction as suspicious, you'll receive an email prompt to review and verify the transaction. This gives you a chance to:

  • Pause and inspect the transaction details

  • Receive security warnings about the recipient's account

  • Decide whether to proceed with the transaction after review

Now, you'll have a chance to review your transaction and view any security warnings that we've identified with the account. If you approve the transaction, your transaction will be forwarded to the blockchain.

Did this answer your question?