In today's digital age, the apps we use for social and business things are getting more advanced, so we need better ways to check if you are really you. Two-Factor Authentication (2FA) is crucial for making the usual way we confirm identities better, but it does have some challenges. Usual 2FA methods have vulnerabilities such as SIM swapping, denial of service (DoS), and man-in-the-middle (MITM)[1] attacks.These issues continue to exist even when services say they have strong encryption. The central system in 2FA is also problematic because if it's breached, an attacker could impersonate an authorized user or mess up the whole service.To tackle these issues, we are proposing decentralized 2FA methods. This means spreading out the authentication process and using public key encryption. In this system, the user's secret keys are encrypted with their wallet's public key, giving users control over their authentication.Users can generate distinct passwords even without their main device. Therefore, as digital security needs grow, the limitations of traditional 2FA are clear. The solution is to shift to decentralized methods, offering better security and more control for users over how they authenticate.