If you want to use it, you should register first. Please, click the Register tab and do the following:
Your e-mail address will be used for confirmations and important notifications. That is why it should be confirmed as soon as possible. We have sent a verification email to your email address. To confirm your email, please do the following:
A single individual may only have one account with YOUnited.
This is a process that protects the security of your account. If you forgot your password, please do the following:
This is a process that protects the security of your account. Note that you need to access this email with the same device that you want to have approved.
Besides Google 2FA, SMS (short message service) authentication is also an important setting for your account security. Compared with Google 2FA, SMS has fewer steps to conclude.
SMS authentication consists of four steps:
The SMS authentication will be successfully bound to your account if all the above-mentioned information is correct and accurate.
Google 2FA is an important way for security verification, which is in coordination conducted by the web-end and the mobile-end. The “Security” page in the security center provides two ways of authentication: 2FA (Google Authentication) and SMS (Phone Authentication). You can enable either of them. Here we give 2FA (Google Authentication) as an example.
Steps of Google 2FA are as following:
If you couldn’t find the email from Younited, please check your trash mailbox first.
If you could not receive any email from Younited, please make sure our domain “*.younited.io” has been added into your email setting as a whitelisted address. (The process of adding a whitelist is in the “Email Settings” -> “Anti-Spam” -> “Whitelist” section, click on the “set whitelist mail address”). You can also check the list of your blocked addresses. You can find it in your email settings.
Universal 2nd Factor (U2F) is an open authentication standard that strengthens and simplifies two-factor authentication (2FA) using specialized USB or NFC devices based on similar security technology found in smart cards.
The USB devices communicate with the host computer using the HID protocol, essentially mimicking a keyboard. This avoids the need for the user to install special hardware driver software in the host computer, and permits application software (such as a browser) to directly access the security features of the device without user effort other than possessing and inserting the device. Once communication is established, the application exercises a challenge–response authentication with the device using public-key cryptography methods and a secret unique device key manufactured into the device. The device key is secured against duplication by a degree of social trust in the commercial manufacturer, and logically secured against reverse-engineering or counterfeiting by the robustness of the encryption and physical possession.
See below, some examples of U2F devices:
The YubiKey is a hardware authentication device manufactured by Yubico which supports one-time passwords, public-key encryption and authentication, and the Universal 2nd Factor (U2F) protocol.
The Trezor Model T is the cryptocurrency hardware wallet designed to be a vault for UNTD coin. Users can safely store their UNTD coin, passwords and other digital keys via this device. Trezor Model T also supports more than 500 coins. The Model T can also serve as a U2F hardware token using its screen to inform users about the request for authentication before they will be approved. In this way, Trezor Model T protects users twice from various kinds of cyber-attacks. It offers an intuitive and convenient interface.
The Model T belongs to the most secure vaults using a 4-digit PIN code on its touch-screen. The PIN code and the passphrase are entered exclusively on the device’ touch-screen, hence any communication with the hosting computer is disabled until the correct PIN code is entered. Any operations with private and public keys are allowed only after a successful user authentication via PIN code. This makes the hardware wallet even more secure.
In case you ever lose your device, you can directly recover your entire wallet by using the 12-word recovery seed. Passwords are never stored or remembered on the device and they are individually locked and encrypted with the Trezor Password Manager You can find more information here: https://trezor.io/. You can find a short and easy tutorial about how to set up your trezor here: Trezor Model T tutorial.
Player vs Player revolution in betting & gaming industry
Contact [email protected]
© YOUNITED TECHNOLOGIES PTE. LTD All rights reserved. Developed by 01People.