OpenAI announced at the end of the presentation, a feature a lot of waiting for the ChatGPT: tickets to a variety of factors (MFA). To this extent, a new kind of security is designed to enhance the safety and security of the user account, as described in a post at the blog of the company.
How to select the certificate to a variety of factors in the ChatGPT
The activation of the authentication by a variety of factors in the ChatGPT is a process that is simple and intuitive. The user can activate this feature by accessing the settings page of the web ChatGPT or through the platform, OpenAI Developer. To set up MFA, you need to have installed the application and confirming to your mobile device and scan a code, GO to add passwords to a single evidence-based, in-time (TOTP) to be vërtetuesi.
After the configuration, you will need to set up the code a 6-digit code, which changes periodically, each time you log in to your account ChatGPT. Here's how to enable the ease of proving by a variety of factors in the ChatGPT:
-Click on your name at the bottom on the right
– Select “Settings”.
-Under “general”, enable the verification of two factors
-Enter your credentials again
-Select a application, certificate, such as the Google Authenticator.
-The importance of the recovery
In the process, the configuration of the MFA, the user provided with a code to the recovery, which needs to be kept in a safe place. This code is essential in the event that you lose your device, or can not use, access TOTP for a good reason. In addition, it may be rikuperoni to your account by means of a code to be sent to the e-mail address, to the relevant.
Mutual authentication by a variety of factors, is more secure than a TEXT message
Experts in cyber security to recommend strongly the activation of the authentication by a variety of factors (MFA) or a certificate with a two-factor (2FA) on all your accounts on the internet because it adds an additional layer of protection, even if the password is your risk.
However, it should be careful, because the MFA is not foolproof. There have been no reports of hackers to bypass the certificate to a variety of factors, using the session to be established now, or by exhaustion of the certificate, the application of a constant check by pushing users to recognize them, only for them to stop.
Therefore, MFA must be used, with self-awareness, given that it provides an additional level of security, but are not protection in absolute terms, from cyber attacks to more sophisticated.
Discussion about this post