Twitter starts to roll out two-factor login verification

Martin Brinkmann
May 22, 2013
Updated • May 22, 2018
Companies, Twitter

Two-factor authentication is one of the best ways to increase the security of online accounts.

Companies and services like Google, PayPal or Valve are already making use of the feature to provide their users with an additional layer of security. A second code needs to be entered after the usual username and password combination has been accepted to complete the authentication process.

Twitter has been working on adding login verification to its service for some time now. On May 22, 2013, the company started to roll out the feature to all of its users.

Twitter uses a SMS-based system that sends codes to verified phone numbers during the login process. This is different from many other services that use authenticator apps, hardware devices or email to generate codes.

Take a look at the following video to see how the new login verification is activated on Twitter.

Here is how to set it up for your account:

  • You need to verify a phone number before you can start to enable two-factor authentication for your account.
  • Go to the Mobile page of the Twitter Settings and verify that a phone number is listed on the page. If it is not, add a phone to the account.
  • Twitter displays whether you need to verify phone number, or if that has been done previously already.
  • Select "set up login verification" and read the instructions. Click on Start once you are done.
  • Type your password and select verify.
  • Click on the "send code" button to have Twitter send a code to your verified mobile device.
  • Type the verification code that is included in the message sent to the phone on Twitter to verify ownership.
  • Click "get backup code" to save a code. The code is for emergencies, for instance, when you don't have access to your device anymore.
  • Next time you log in to Twitter you enter your username and password like usual, and the verification code that Twitter sent to your phone on the second page. You can only sign in successfully if both checks are correct.

twitter login verification

You can authorize third party applications on the applications page that do not support the two-factor authentication scheme yet.

Check out Twitter's instructions on setting up two-factor authentication on the site for additional information.

Closing Words

Two-factor authentication is an important step in improving the overall security of Twitter accounts. What feels a bit strange is that you cannot use Twitter's apps to verify your phone.

Twitter starts to roll out two-factor login verification
Article Name
Twitter starts to roll out two-factor login verification
Find out how to configure login verification on Twitter to add a second layer of protection to your Twitter account; the system uses SMS and a linked mobile phone.
Ghacks Technology News

Tutorials & Tips

Previous Post: «
Next Post: «


  1. The Dark Lady said on July 9, 2023 at 11:19 am

    Martin, I would appreciate that you do not censor this post, as it’s informative writing.

    Onur, there is a misleading statement “[…] GIFs are animated images …”. No, obviously you don’t seem to have take much notice of what you were told back in March regarding; Graphics Interchange Format (GIF).

    For example, (if you had read my replies within that thread, you might have learnt something useful). I even mentioned, “GIF intrinsically supports animated images (GIF89a)”.

    You linked to said article, [Related: …] within this article, but have somehow failed to take onboard what support you were given by several more knowledgeable people.

    If you used AI to help write this article, it has failed miserably.

  2. KeZa said on August 17, 2023 at 5:58 pm

    AI is stupid, and it will not get any better if we really know how this all works. Prove me wrong..

  3. Database failure said on August 18, 2023 at 5:21 pm

    Martin, [#comment-4569908] is only meant to be in: []. Whereas it appears duplicated in several recent random low-quality non relevant articles.

    Obviously it [#comment-4569908] was posted: 9 July 2023. Long before this thread even existed… your database is falling over. Those comments are supposed to have unique ID values. It shouldn’t be possible to duplicate the post ID, if the database had referential integrity.

  4. Howard Pearce said on August 25, 2023 at 12:24 pm

    Don’t tell me!

    Ghacks wants the state to step in for STATE-MANDATED associations to save jobs!!!

    Bring in the dictatorship!!!

    And screw Rreedom of Association – too radical for Ghacks maybe

  5. Howard Allan Pearce said on September 7, 2023 at 9:13 am

    GateKeeper ?

    That’s called “appointing” businesses to do the state’s dirty work!!!!!

    But the article says itself that those appointed were not happy – implying they had not choice!!!!!!

  6. owl said on September 7, 2023 at 9:50 am

    @The Dark Lady,
    @Database failure,
    @Howard Pearce,
    @Howard Allan Pearce,

    Note: I replaced the quoted URI scheme: https:// with “>>” and posted.

    The current is owned by “Softonic International S.A.” (sold by Martin in October 2019), and due to the fate of M&A, has changed in quality.
    Many Authors of bloggers and advertisers certified by Softonic have joined the site, and the site is full of articles aimed at advertising and clickbait.
    As it stands, except for articles by Martin Brinkmann, Mike Turcotte, and Ashwin, they are low quality, unhelpful, and even vicious. It is better not to read those articles.
    How to display only articles by a specific author:
    Added line to My filters in uBlock Origin:,.home-posts,.home-category-post:not(:has-text(/Martin Brinkmann|Mike Turcotte|Ashwin/))

    By the way, if you use an RSS reader, you can track exactly where your comments are (I’m an iPad user, so I use “Feedly Classic”, but for Windows I prefer the desktop app “RSS Guard”).
    RSS Guard: Feed reader which supports RSS/ATOM/JSON and many web-based feed services.

  7. Anonymous said on September 14, 2023 at 6:41 pm

    We all live in digital surveillance glass houses under scrutiny of evil people because of people like Musk. It’s only fair that he takes his turn.

  8. Anonymous said on September 18, 2023 at 1:31 pm

    “Operating systems will be required to let the user choose the browser, virtual assistant and search engine of their choice. Microsoft cannot force users to use Bing or Edge. Apple will have to open up its iOS operating system to allow third-party app stores, aka allow sideloading of apps. Google, on the other hand, will need to provide users with the ability to uninstall preloaded apps (bloatware) from Android devices. Online services will need to allow users to unsubscribe from their platform easily. Gatekeepers need to provide interoperability with third-parties that offer similar services.”

    Wonderful ! Let’s hope they’ll comply with that law more than they are doing with the GDPR.

  9. sean conner said on September 27, 2023 at 6:21 am

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.