Phishing-Resistant Sign-In You Can Trust
With increasingly sophisticated phishing attacks and credential theft schemes, just knowing a username and password is no longer enough. Kraken has built a sign-in model designed to resist phishing, account take-overs, and unauthorized changes by layering multiple security features. This ensures that even if one line of defense fails, others are in place.
Central to this approach are features like Passkeys (device-bound FIDO2 credentials), the Security Shield dashboard, Global Settings Lock (GSL), and Master Key. These tools work together so that users can see, control, and protect their account from phishing attempts. :contentReference[oaicite:0]{index=0}
Kraken supports Passkeys, which are device-bound credentials following the FIDO2 standard. These can use biometrics (face or fingerprint), PINs, or security hardware keys. The key point: Passkeys are **bound** to a specific domain (kraken.com) and are **not reusable** elsewhere, making them strongly phishing-resistant. :contentReference[oaicite:1]{index=1}
Note: Using Passkeys or security keys means you must keep your device secure. If you lose the device, you may need recovery via other methods. Always have at least one backup method. :contentReference[oaicite:2]{index=2}
Beyond the primary sign-in password, Kraken requires enabling Sign-In 2FA. Once enabled, any changes to account security settings (2FA, Master Key, etc.) trigger a “Step-Up 2FA”, meaning you must re-authenticate with your chosen 2FA method before making those changes. This protects from attackers who might already have partial account access. :contentReference[oaicite:3]{index=3}
The Master Key is a separate credential used for high-risk actions: resetting your password, regaining sign-in access if 2FA is lost, and bypassing or controlling the Global Settings Lock (GSL). It is critical that the Master Key be configured via a different method than your regular 2FA (e.g. if your main 2FA is a passkey, set the Master Key via a different security key or authenticator app). :contentReference[oaicite:4]{index=4}
GSL locks down sensitive account settings so they cannot be changed without additional security verification. If GSL is active, things like disabling 2FA, changing withdrawal addresses, modifying email/password, etc., are blocked or delayed. Enabling GSL adds a strong safeguard against phishing or compromised credentials. :contentReference[oaicite:5]{index=5}
Kraken includes a **Security Shield** — a visual dashboard that shows your account’s current security level. As you enable more security features (sign-in 2FA, funding 2FA, Master Key, GSL), the shield icon fills up and changes color, giving you at a glance how well-protected your account is. :contentReference[oaicite:6]{index=6}
If you use the same device for both your Sign-In 2FA and your Master Key, or if credentials are stored insecurely, you lose separation of control. Attackers gaining control of that device may break multiple layers of protection at once. :contentReference[oaicite:16]{index=16}
Kraken’s security features help a lot, but phishing can still succeed if you share credentials or authorize a fake site. Always verify the URL and authenticity before entering passkeys, codes, or approving settings changes. No security layer helps if the user is tricked into giving away secrets. :contentReference[oaicite:17]{index=17}
If you lose the device that holds your Passkey or 2FA method, you may need to use the Master Key or Kraken’s support flow to recover access. These steps can sometimes be slow or require documentation. :contentReference[oaicite:18]{index=18}
Features like the Global Settings Lock may have unlock delays (e.g. 24 hours to 30 days) if no Master Key is preconfigured. While this increases security, it can be inconvenient if you need urgent changes. :contentReference[oaicite:19]{index=19}
Kraken’s sign-in security is among the strongest in the crypto space: device-bound passkeys, multiple 2FA methods, a Master Key for critical backup, a Global Settings Lock that blocks risky changes, and a Security Shield dashboard for transparency. If you set these up properly, your account is highly resilient against phishing and unauthorized access.
Here’s a simple checklist to follow now: