How to Unbind, Reset, or Rebind Account Security Items

·

Security is paramount for protecting your digital assets. Whether you need to unbind a security item, reset a lost one, or rebind a new authentication method, this guide provides step-by-step instructions to ensure a smooth transition while maintaining account integrity.

👉 Learn how to secure your account effortlessly


1. Unbinding Security Items

If you no longer need a specific security verification method (e.g., phone, email, or Google Authenticator), follow these steps:

  1. Click here and select the security item you wish to unbind.
  2. Complete identity verification (e.g., SMS code, email confirmation, or 2FA).
  3. Submit required documents for review.
  4. Once approved, the security item will be removed.

Note:


2. Resetting Lost or Inaccessible Security Items

For accounts with only one security method (e.g., sole phone or email) still logged in:

If your security item is lost or non-functional:

  1. Contact customer support to request a rebind.
  2. After verification, you’ll receive a rebind link within 48 hours (click "Proceed").
  3. Log in using your old credentials.
  4. Enter the new security details (e.g., replacement phone/email).

Critical Reminder:


3. Rebinding Security Items for Logged-Out Accounts

For accounts locked due to lost security items:

  1. Reach out to customer support for assistance.
  2. If you recall your login details:

    • Follow standard rebinding steps.
  3. If you’ve forgotten your password:

    • Complete additional identity checks.
    • Verified users will receive manual rebind support.

👉 Need urgent help? Contact support now


FAQ Section

Q1: Why are withdrawals restricted after security changes?

A1: This 24-hour cooldown prevents unauthorized access, ensuring only legitimate modifications proceed.

Q2: Can I expedite the rebinding process?

A2: No—verification protocols are mandatory for account safety.

Q3: What if I no longer have access to my registered email/phone?

A3: Submit proof of ownership (e.g., ID documents) via customer support for manual recovery.

Q4: How often can I change security methods?

A4: Frequent changes may trigger additional scrutiny. Update only when necessary.


Final Tips

For further guidance, visit our Security Best Practices Hub.