Trustworthy offers multiple forms of user authentication to keep your information safe:

Identity Verification

Trustworthy requires you to create and validate your identity before creating your account and adding any information. We ask for an email username, a strong password, and two-factor authentication to validate that you are who you say you are.

From the beginning of your Trustworthy experience, you are the arbiter of your account and information. Know that only you — and the trusted people you invite to your account — have access to your information.

Password

We require a highly secure password formula for all users. That entails a minimum of 8 characters with numbers, symbols, and upper- and lower-case characters. We recommend creating a password of 14 characters or more.

Increasing the number of characters and interspersing numbers and symbols dramatically enhances security. A more complex and lengthy password makes it cryptic enough that it would take an attacker decades to crack.

Two-factor Authentication

Trustworthy requires two-factor authentication as a default — not an option — to verify your identity and allow you to log in to your account.

Our platform supports multiple different factors, including:

  • SMS

  • Voice verification

  • Authenticator apps

  • Hardware security keys

As a Trustworthy member, multi-factor authentication is non-negotiable. You can choose to add additional layers of security depending on your personal security preferences.

Two-factor authentication is an extra layer of security for Trustworthy accounts. This design ensures that you’re the only one who can access your account, even if someone else knows your password.

Recent research suggests that your account is 99.9% less likely to be compromised if you use two-factor authentication. In fact, many technology companies are moving towards two-factor authentication as the default.

Hardware Keys

Trustworthy provides hardware security keys that allow you to add a second authentication factor to online services.

If you use a hardware security key, it must be physically present to authenticate and log in to your account. Hardware security keys are one of the best ways to avoid phishing and account takeovers.

Please email experts@trustworthy.com to request a Trustworthy hardware security key.

Biometric Authentication

Trustworthy uses biometric (facial or fingerprint) authentication on our iOS mobile app.

Biometric authentication allows for a convenient and fast user experience, while also providing a high level of security that's difficult to fake or steal. Because biometrics can only be provided by living, breathing people, it's also harder for robots to impersonate or breach.

Did this answer your question?