HuulkFAQ02 Account Registration
How to register on Huulk?

If you want to use it, you should register first. Please, click the Register tab and do the following:

  1. Fill in your email address.   
  2. Create a password and confirm it.
  3. It is recommended to use a password you have never used before.
  4. Click on Register.
  5. Verify your email address.
  6. Approve new device.
How to verify my email?

Your e-mail address will be used for confirmations and important notifications. That is why it should be confirmed as soon as possible. We have sent a verification email to your email address. To confirm your email, please do the following:

  1. Open your inbox and find the e-mail. It should be delivered within 30 minutes. If you can't find it, please check your spam folder.
  2. Open the e-mail
  3. Click the button Verify my email address.
  4. The link will automatically redirect you back to
  5. Then click the button Log in. 

Should you have any issues with the e-mail verification, please contact our support.

How to approve a new device?

This is a process that protects the security of your account. Note that you need to access this email with the same device that you want to have approved.

  1. Open inbox of your registration email.
  2. Click the confirmation email we have sent to you.
  3. Then click the button Approve new device.
  4. The link will automatically redirect you back  to Huulk.
How many accounts can I have?

A single individual may only have one account with Huulk.

What should I do if I forgot my password?

This is a process that protects the security of your account. If you forgot your password, please do the following:

  1. Please go to [Home] - [Login] and click [Forgot password].  
  2. Enter the email address that you registered with and open your email inbox.
  3. Click the reset password link in the email.
  4. Type and re-enter the new password.
  5. Click [Set password] to submit.
SMS Authentication

Besides Google 2FA, SMS (short message service) authentication is also an important setting for your account security. Compared with Google 2FA, SMS has less steps to conclude.

SMS authentication consists of four steps:

  1. Choose the registration country of your phone number.
  2. Enter your phone number
  3. Then click the ‘‘Submit” button
  4.  Get your SMS code and enter it into the input box.

The SMS authentication will be successfully bound to your account if all above mentioned information are correct and accurate.

What is Google 2FA?

Google 2FA is an important way for security verification, which is in coordination conducted by the web-end and the mobile-end. The “Security” page in the security center provides two ways of authentication: 2FA (Google Authentication) and SMS (Phone Authentication). You can enable either of them. Here we give 2FA (Google Authentication) as an example.

Steps of Google 2FA are as following:

  • Download the app “Authentication”. IOS users can download this app from the APP Store and users with Android devices can download it from their application stores.

  • Open the app “Authentication”, click “+” at upper right corner, choose ‘‘scan barcode” and open the scanning frame.

  • Use the camera to scan the QR code provided by Huulk.

  • Check your 6-digit pin corresponding to your Huulk account in your cellphone end and enter it into the input field. Now your account is connected to Google 2FA.

How to disable Google 2FA?
  1. Please log in to Huulk, go to My profile and then find Security login options.
  2. Click “Disable” in Google Auth section.
  3. You can disable each category except for the Email. Email verification is required.
What to do if I couldn’t receive any email from Huulk?

If you couldn’t find the email from Huulk, please check your trash mailbox first.
If you could not receive any email from Huulk, please make sure our domain “*” has been added into your email setting as a whitelist address.

(The process of adding a whitelist is in the “Email Settings” -> “Anti-Spam” -> “Whitelist” section, click on the “set whitelist mail address”)  

You can also check the list of your blocked addresses. You can find it in your email settings.

What should I do in case I lose my 2FA device and cannot login?


Universal 2nd Factor

Universal 2nd Factor (U2F) is an open authentication standard that strengthens and simplifies two-factor authentication (2FA) using specialized USB or NFC devices based on similar security technology found in smart cards.

The USB devices communicate with the host computer using the HID protocol, essentially mimicking a keyboard. This avoids the need for the user to install special hardware driver software in the host computer, and permits application software (such as a browser) to directly access the security features of the device without user effort other than possessing and inserting the device. Once communication is established, the application exercises a challenge–response authentication with the device using public-key cryptography methods and a secret unique device key manufactured into the device. The device key is secured against duplication by a degree of social trust in the commercial manufacturer, and logically secured against reverse-engineering or counterfeiting by the robustness of the encryption and physical possession.

 See below, some examples of U2F devices:

  1. Yubikey
  2. Trezor Model T
How to use Yubikey.

The YubiKey is a hardware authentication device manufactured by Yubico which supports one-time passwords, public-key encryption and authentication, and the Universal 2nd Factor (U2F) protocol.

  1. Insert your Yubikey device into the USB port, wait until it has been installed
  2. Once you plug in the YubiKey, the LED on the device should light up
  3. Press the gold button for one second – the code from the YubiKey will be automatically entered in the selected field
How to set up your trezor?

The Trezor Model T is the cryptocurrency hardware wallet designed to be a vault for Capricoin. Users can safely store their Capricoins, passwords and other digital keys via this device. Trezor Model T also supports more than 500 coins. .

The Model T can also serve as an U2F hardware token using its screen to inform users about the request for authentication before they will be approved. In this way, Trezor Model T protects users twice from various kinds of cyber-attacks. It offers an intuitive and convenient interface.

The Model T belongs to the most secure vaults using a 4-digit PIN code on its touch-screen. The PIN code and the passphrase are entered exclusively on the device’ touch-screen, hence any communication with the hosting computer is disabled until the correct PIN code is entered. Any operations with private and public keys are allowed only after a successful user authentication via PIN code. This makes the hardware wallet even more secure.

In case you ever lose your device, you can directly recover your entire wallet by using the 12-word recovery seed. Passwords are never stored or remembered on the device and they are individually locked and encrypted with the Trezor Password Manager.

You can find more information here:

You can find short and easy tutorial about how to set up your trezor here: Trezor Model T tutorial