Depends what he means by authenticate.

Having to give phone number & email is enough authentication.

Anything else is intrusive and sketchy.

In response Kim Runner to her Publication

Only people mentioned by @JazzyJoly in this post can reply

No replys yet!

It seems that this publication does not yet have any comments. In order to respond to this publication from Jazzy Joly, click on at the bottom under it