This page gives you a clear, human-friendly guide to accessing and understanding your CryptoHarbor account. We focus on practical security, quick recovery options, and concise explanations so you can move confidently. The content below explains what to expect, how to keep your holdings safe, and steps to regain access if needed.
Account Safety
Two-factor authentication, device verification, and automatic session timeouts keep your account protected even if a password is compromised.
Recovery Tools
Straightforward, well-documented recovery options: recovery codes, verified email, and support-guided identity checks.
Access Controls
Device lists, IP notifications, and login history so you always know where your account is open.
Privacy-First
Minimal data collection and optional anonymized analytics — we respect what we need and avoid what we don't.
How our access flow works
When you attempt to sign in, our system runs a short, layered authentication check: password verification, optional biometric validation (on compatible devices), and a two-factor prompt if your sign-in attempt is new or from an untrusted device. All steps are designed to balance security and convenience — trusted devices reduce friction while unusual activity triggers stronger checks.
Security principals we follow
- Least privilege: accounts start with minimal access; enable features as needed.
- Transparency: detailed logs and notifications for account events.
- Defense in depth: multiple independent protections so a single failure does not expose funds.