{"id":6078,"date":"2020-02-20T16:07:30","date_gmt":"2020-02-20T13:07:30","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=6078"},"modified":"2025-08-08T23:29:32","modified_gmt":"2025-08-08T20:29:32","slug":"twitter-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/twitter-two-factor-authentication\/","title":{"rendered":"Twitter Two-Factor Authentication in Details"},"content":{"rendered":"\n<p>With over <a rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/s22.q4cdn.com\/826641620\/files\/doc_financials\/2019\/q3\/Q3-2019-Shareholder-Letter.pdf\" target=\"_blank\">145 million<\/a> active users Twitter is widely used not only for personal entertainment but for business and political agendas too. Yet, surprisingly (or not, considering that they <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/techcrunch.com\/2019\/10\/08\/twitter-admits-it-used-two-factor-phone-numbers-and-emails-for-targeted-advertising\/\" target=\"_blank\">did admit<\/a> to using phone numbers for targeting ads) Twitter has been reluctant to forgo SMS to deliver one time passwords for their 2 step verification for a very, very long time. Until finally, in November last year, they gave in and allowed for Twitter two-factor authentication without requiring the phone number.<\/p>\n\n\n\n<p>In this post we will look into all the 2FA methods Twitter supports, show you how to activate each of them and how to make sure you are able to login even if you lose your 2FA Twitter token.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/www.protectimus.com\/token\/slim\/\" style=\"background-color:#269400\" target=\"_blank\" rel=\"noreferrer noopener\">Buy a hardware token for Twitter 2FA<\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to enable Twitter 2FA via SMS and whether it\u2019s worth it<\/strong><\/h2>\n\n\n\n<p>As we\u2019ve already mentioned above \u2014 we are decidedly against Twitter 2FA SMS based. As a matter of fact \u2014 we vehemently insist that using SMS to deliver verification code for MFA anywhere, not only in Twitter 2FA, is not safe and should be avoided if at all possible.<\/p>\n\n\n\n<p>Why are we so against SMS? While it is convenient and cheap to use, it is also astonishingly easy to hack. The ways to break into an account that\u2019s protected only this way are <a href=\"https:\/\/www.protectimus.com\/blog\/reddit-hacked\/\">numerous<\/a>. Starting with a simple SIM swap and ending with more complex things like intercepting the passwords by exploiting the numerous vulnerabilities of the telecom infrastructure. We\u2019ve talked about these and other SMS 2FA vulnerabilities like fake cell towers extensively before, you can read it <a href=\"https:\/\/www.protectimus.com\/blog\/sms-authentication\/\">here<\/a>.<\/p>\n\n\n\n<p>Yet, while Twitter 2FA without SMS is the way to go, we do understand that circumstances might be demanding otherwise and one might want to know how to send Twitter two-factor authentication code via SMS. So here\u2019s a simple guide on it:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Go to your account settings (&#8220;More&#8221; \u2192 &#8220;Settings and privacy&#8221;) and find \u201cSecurity\u201d \u2192\u201cTwo-factor Authentication\u201d.<\/li>\n\n\n\n<li>Check the \u201cText message\u201d box and press \u201cGet Started\u201d.<\/li>\n\n\n\n<li>Enter your user pass then press on \u201cVerify\u201d. If there\u2019s no telephone number allied with the user, you will need to provide one now.<\/li>\n\n\n\n<li>Type in the Twitter confirmation code that was messaged to the provided number. Next you\u2019ll get a Twitter backup code on the screen, make sure to save it, or make a screenshot and save that in a secure place. We&#8217;ll expand on why later in this article.<\/li>\n\n\n\n<li>Click \u201cGot it\u201d to finish.<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/miro.medium.com\/max\/700\/1*UHl7gnL77KAfqNzH6RrvGQ.gif\" alt=\"Twitter two-factor authentication via SMS\"\/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>From now on to get into your Twitter account on any device, be it Twitter mobile or desktop, an authentication code will be required and that code will be messaged to your phone.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/2fa-chatbots-vs-sms-authentication\/\">2FA Chatbots vs. SMS Authentication<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Twitter two-factor authentication with code generator app<\/strong><\/h2>\n\n\n\n<p>So we\u2019ve established that Twitter two factor authentication without phone number is much more preferable. But what are the alternatives? A <a href=\"https:\/\/www.protectimus.com\/protectimus-smart\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">2FA code generator app<\/a> for Twitter is a nice Twitter phone number bypass that provides more security than SMS ever could. A one-time twittercode is generated directly on the smartphone, which eliminates a good portion of vulnerabilities that can be exploited to gain unauthorized access to your Twitter account. A Twitter verification code hack is way harder to do if the password is not transmitted via GSM, or even Internet.<\/p>\n\n\n\n<p>Of course, this type of MFA is not a bulletproof option. Even if the Twitter code generator app does not require the Internet to operate, the phone is still connected and as such is vulnerable. Moreover, you can\u2019t avoid a stolen Twitter app if the phone itself is stolen.<\/p>\n\n\n\n<p>But an MFA app is still a good and safer choice. There\u2019s an abundance of apps to choose from and most of them are either cheap or free. And chances are \u2014 you already have one of them installed, there\u2019s even a Twitter 2 factor authentication Google Authenticator option. In case you are not sure which Twitter verification code generator is the best for you here\u2019s a <a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">comprehensive list<\/a> of the best 2FA apps currently available.<\/p>\n\n\n\n<p>So, how to activate code generator feature for Twitter?<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>In the settings menu go to \u201cSecurity\u201d \u2192\u201cTwo-factor Authentication\u201d where the \u201cAuthentication app\u201d box needs to be checked.<\/li>\n\n\n\n<li>Make sure to study the provided guide and press the \u201cStart\u201d button.<\/li>\n\n\n\n<li>If you haven\u2019t yet got an MFA app choose one and install it. After the Twitter code generator app download is done and the installation is complete scan the QR code provided by Twitter to connect the MFA application with Twitter login. Do so and click \u201cNext\u201d<\/li>\n\n\n\n<li>Type in the pass produced by the MFA application and click the \u201cVerify\u201d button.<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/miro.medium.com\/max\/1400\/1*R7I1qCOFjgH9GVjzFt1KvA.gif\" alt=\"Twitter two-factor authentication via 2FA app\"\/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to enable Twitter two-factor authentication with a hardware token<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.protectimus.com\/slim-mini\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Hardware tokens<\/a> are the most bulletproof defense measure you can get when it comes to MFA. These small devices are not connected to any network, their only purpose is to generate one-time passes. As you can imagine, intercepting such a password is impossible. As well as hacking the token itself. There simply is no entryway.<\/p>\n\n\n\n<p>To enable two-factor authentication Twitter suggests utilizing USB tokens, but this approach still requires SMS or 2FA app activation. You can find how to do it <a href=\"https:\/\/help.twitter.com\/en\/managing-your-account\/two-factor-authentication\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">here<\/a>.<\/p>\n\n\n\n<p>The best physical token to use for Twitter authentication is not a USB token though, it&#8217;s the programmable token <a href=\"https:\/\/www.protectimus.com\/slim-mini\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus Slim NFC<\/a>. Why? First of all \u2014 the security key is not hardcoded into them, which means they can be programmed to be reused with another account. Second \u2014 they are impenetrable for any malware, you do not need to connect them to a computer, which is a lot more secure. You can easily use them for Twitter mobile log in. Finally, they are as easy to activate as any MFA application. Note that you&#8217;ll need an Android smartphone with NFC to connect this hardware token to Twitter.<\/p>\n\n\n\n<div class=\"schema-how-to wp-block-yoast-how-to-block\"><p class=\"schema-how-to-description\">Here\u2019s how:<\/p> <ol class=\"schema-how-to-steps\"><li class=\"schema-how-to-step\" id=\"how-to-step-1582121698206\"><strong class=\"schema-how-to-step-name\">Download <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.protectimus.totpburner.nfc\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus TOTP Burner application<\/a>.<\/strong> <p class=\"schema-how-to-step-text\">The app is currently available for Android smartphones only.<\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1582121720588\"><strong class=\"schema-how-to-step-name\">Repeat steps 1 and 2 from the previous paragraph.<\/strong> <p class=\"schema-how-to-step-text\">Start adding Authentication app on Twitter.<\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1582121766404\"><strong class=\"schema-how-to-step-name\">Enable NFC and scan the QR code with the secret key with the Protectimus TOTP Burner application.<\/strong> <p class=\"schema-how-to-step-text\">Instead of scanning the Twitter QR code with an MFA app you need to scan the code with the Burner app. If the scan is completed successfully the app will show you a \u201cNext\u201d button, click it.<img decoding=\"async\" alt=\"How to program Protectimus Slim NFC\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/how-to-burn-the-seed-to-protectimus-slim-nfc-en1.png\"><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1582121854094\"><strong class=\"schema-how-to-step-name\">&#8220;Burn&#8221; the secret key into the hardware token. <\/strong> <p class=\"schema-how-to-step-text\">Turn the Protectimus Slim NFC token on and put it close to the smartphone\u2019s NFC antenna. When the TOTP Burner application recognizes the token you\u2019ll hear a signal, then tap a \u201cContinue\u201d button.<\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1582122115725\"><strong class=\"schema-how-to-step-name\">Enter the one-time password from the token on Twitter to verify it and enable 2-factor authentication.<\/strong> <p class=\"schema-how-to-step-text\">Now that the token is activated all you need to do is enter the pass it generates on Twitter.<\/p> <\/li><\/ol><\/div>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/totp-tokens-protectimus-slim-nfc-faq\/\">TOTP Tokens Protectimus Slim NFC: Frequently Asked Questions<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to burn Protectimus SLIM token?\" width=\"838\" height=\"471\" src=\"https:\/\/www.youtube.com\/embed\/Zc9AwLMKAmg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to download backup codes for your Twitter account<\/strong><\/h2>\n\n\n\n<p>Sadly, no matter how secure the MFA method you choose is, life happens and tokens get lost, phones stolen and passwords forgotten. That\u2019s why we mentioned briefly above that you&#8217;ll want to save the backup code Twitter generates when you turn on Twitter two factor authentication. Let\u2019s expand on that a bit.<\/p>\n\n\n\n<p>As has already been mentioned, Twitter backup code generator is activated in time with the 2FA activation on any Twitter client, be it mobile, desktop, or app. But 4 more additional backup codes can be generated from twitter.com at any time.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"542\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/05\/twitter-backup-codes.gif\" alt=\"How to download Twitter backup codes\" class=\"wp-image-6400\"\/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Make sure to place these backup account passwords in a secure place, you can store them as screenshots, or printouts, or just write them down.<\/p>\n\n\n\n<p>In the event that the phone is lost, or the token is broken, or even if the phone number is changed, one of these codes will be used to restore access to your Twitter account.<\/p>\n\n\n\n<p>The codes have to be applied in the exact sequence they were generated; a code used out of order will revoke all the codes generated before it.<\/p>\n\n\n\n<p>Twitter backup codes are to be used for twitter.com and mobile twitter, as well as for Twitter clients, and Android and iOS apps. They can not be used for third party apps that are associated with the Twitter account. For those you will need temporary passwords, so make sure not to confuse the two.<\/p>\n\n\n\n<p>Temporary passwords are sent out by Twitter automatically when you enable 2FA and need to login on other devices. But your own temp password can be generated as well from your Twitter account&#8217;s security settings in the \u201cAdditional methods\u201d part.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Read more:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/how-to-protect-facebook-account-from-being-hacked\/\">How to Protect Facebook Account from Being Hacked<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/how-to-protect-your-privacy-on-facebook\/\">How to Protect Your Privacy on Facebook<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/google-authenticator-backup\/\">How to Backup Google Authenticator or Transfer It to a New Phone<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/how-to-secure-bitcoin-wallet\/\">How to Secure Bitcoin Wallet<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/9-gmail-security-rules\/\">9 Must Follow Gmail Security Rules<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/paypal-two-factor-authentication\/\">PayPal Two-Factor Authentication with Hardware Security Key<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-for-windows\/\">Two-factor authentication for Windows 7, 8, 10<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/4-reasons-two-factor-authentication-isnt-a-panacea\/\">4 Reasons Two-Factor Authentication Isn\u2019t a Panacea<\/a><\/li>\n<\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>With over 145 million active users Twitter is widely used not only for personal entertainment but for business and political agendas too. Yet, surprisingly (or not, considering that they did admit to using phone numbers for targeting ads) Twitter has been reluctant to forgo SMS to deliver one time passwords for their 2 step verification [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":6111,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[9,15,329],"tags":[16,1300,12,120,335,421,130,139,1348,99],"class_list":["post-6078","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protectimus-products","category-rd","category-setup-guides","tag-2fa","tag-2fa-apps-en","tag-mfa","tag-multifactor-authentication","tag-protectimus-slim-nfc-en","tag-setup-guides","tag-sms-authentication","tag-tokens","tag-twitter-en","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=6078"}],"version-history":[{"count":32,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6078\/revisions"}],"predecessor-version":[{"id":9116,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6078\/revisions\/9116"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/6111"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=6078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=6078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=6078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}