Twitter to charge for two-factor authentication from March 20: How to use it without paying

Date:

Share post:

Because Twitter is introducing its paid subscription package Twitter Blue, the company has been implementing a number of new tools alongside a number of restrictions. For example, the SMS two-factor authentication will be restricted to only those users who have purchased the monthly service.

Two-factor authentication is a subset of multi-factor authentication (also known as MFA), which adds an additional layer of protection to your social media profiles in addition to the username and password you already use.

Prior to March 20, this safety function could be used on Twitter at no additional cost; however, after that date, only Twitter Blue subscribers will have access to it.

People who do not have a Twitter Blue subscription have been informed about the new update and given a deadline of March 19 to remove the two-factor authentication in order to prevent losing access to the microblogging platform entirely.

When you log in with two-factor authentication (2FA), in addition to entering your password, you are also required to input a code or use a security key. This additional process helps to ensure that no one but you is able to access your account other than yourself.

After March 20, 2023, we will no longer allow users of Twitter who are not subscribed to Twitter Blue to use text messages as a manner of two-factor authentication. At that point, two-factor authentication via text message will be disabled for accounts that still have it enabled. According to a statement released by Twitter, turning off text message two-factor authentication will not automatically disconnect your phone number from your Twitter account.

If non-Blue users do not implement a different authentication technique, Twitter has stated that it will disable 2FA entirely. Users have the option of bolstering the safety of their accounts by utilizing either a security key or an authentication program. This will allow them to circumvent the issue.

How to Change Settings for Two-Factor Authentication If you do not wish to purchase Twitter Blue but are scared of losing your account or don’t know how to log in without using two-factor authentication, then there is no need for you to worry. Getting rid of two-factor authentication is not too difficult.

To begin, you will need to launch Twitter either on your mobile device or through a computer. Select Account Access & Security from the drop-down menu.

Now navigate to the Security menu and select Two-factor authentication from the drop-down menu.

You will now have three choices available to select from.

• Receive a text message on your mobile phone containing an authentication code that you will need to input when you log in to Twitter. This method requires the use of your mobile phone.

• Authentication app — This feature requires the use of a mobile authentication app in order to obtain a verification number that must be entered each time you log in to Twitter.

• Security key — When you register in to Twitter using this method, you will be asked to insert a security key into your computer or sync it to your mobile device.

Select the authenticator app of your choosing, such as Google Authenticator or Microsoft Authenticator, in order to log in to the authentication app. After that, log into your Twitter account and begin following the same groups of people as before. After you have decided which application to use, you will need to enter your password and then select the Confirm button.

If you haven’t confirmed your email address with Twitter yet, the microblogging platform will give you an email containing a confirmation code and a link that will take you back to the social network platform. If this is the case, you can expect to receive the email shortly.

You need to have a tangible authentication key, such as YubiKey, in order to have a security key. However, you need to make sure that the key supports your browser, which could be Chrome, Safari, Firefox, or something else. Now navigate to Twitter and follow the instructions that were previously discussed, making sure to click on the Security Key button.

Now Twitter will inquire about your password, and if you haven’t already validated your email address with the platform, you’ll receive an email containing a code and a link that will take you back to the site. After you have finished reading the instructions and proceeded on to the next step, you will need to either connect the key to the USB port of your computer or sync it using Bluetooth or NFC.

Two-factor authentication > Manage security keys is where you’ll find your security key once it’s been configured properly and added to the system.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

1 × 5 =

This site uses Akismet to reduce spam. Learn how your comment data is processed.

[tds_leads input_placeholder="Email address" btn_horiz_align="content-horiz-center" pp_checkbox="yes" pp_msg="SSd2ZSUyMHJlYWQlMjBhbmQlMjBhY2NlcHQlMjB0aGUlMjAlM0NhJTIwaHJlZiUzRCUyMiUyMyUyMiUzRVByaXZhY3klMjBQb2xpY3klM0MlMkZhJTNFLg==" msg_composer="success" display="column" gap="10" input_padd="eyJhbGwiOiIxNXB4IDEwcHgiLCJsYW5kc2NhcGUiOiIxMnB4IDhweCIsInBvcnRyYWl0IjoiMTBweCA2cHgifQ==" input_border="1" btn_text="I want in" btn_tdicon="tdc-font-tdmp tdc-font-tdmp-arrow-right" btn_icon_size="eyJhbGwiOiIxOSIsImxhbmRzY2FwZSI6IjE3IiwicG9ydHJhaXQiOiIxNSJ9" btn_icon_space="eyJhbGwiOiI1IiwicG9ydHJhaXQiOiIzIn0=" btn_radius="0" input_radius="0" f_msg_font_family="521" f_msg_font_size="eyJhbGwiOiIxMyIsInBvcnRyYWl0IjoiMTIifQ==" f_msg_font_weight="400" f_msg_font_line_height="1.4" f_input_font_family="521" f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEzIiwicG9ydHJhaXQiOiIxMiJ9" f_input_font_line_height="1.2" f_btn_font_family="521" f_input_font_weight="500" f_btn_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSJ9" f_btn_font_line_height="1.2" f_btn_font_weight="600" f_pp_font_family="521" f_pp_font_size="eyJhbGwiOiIxMiIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSJ9" f_pp_font_line_height="1.2" pp_check_color="#000000" pp_check_color_a="#309b65" pp_check_color_a_h="#4cb577" f_btn_font_transform="uppercase" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjQwIiwiZGlzcGxheSI6IiJ9LCJsYW5kc2NhcGUiOnsibWFyZ2luLWJvdHRvbSI6IjMwIiwiZGlzcGxheSI6IiJ9LCJsYW5kc2NhcGVfbWF4X3dpZHRoIjoxMTQwLCJsYW5kc2NhcGVfbWluX3dpZHRoIjoxMDE5LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMjUiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" msg_succ_radius="0" btn_bg="#309b65" btn_bg_h="#4cb577" title_space="eyJwb3J0cmFpdCI6IjEyIiwibGFuZHNjYXBlIjoiMTQiLCJhbGwiOiIwIn0=" msg_space="eyJsYW5kc2NhcGUiOiIwIDAgMTJweCJ9" btn_padd="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTBweCJ9" msg_padd="eyJwb3J0cmFpdCI6IjZweCAxMHB4In0=" msg_err_radius="0" f_btn_font_spacing="1"]
spot_img

Related articles

The Next Frontier of AI: Microsoft Research’s Vision for 2026 and Beyond

Discover the concrete advances set to transform AI in 2026. From light-speed infrastructure and AI lab assistants that run experiments, to agents that negotiate in digital marketplaces and models that design new proteins, this article details the practical next steps that will make AI more powerful, collaborative, and integrated into solving our world's complex challenges.

The BRICS Currency Initiative: Reshaping Global Finance in an Age of Economic Polarization

In the intricate tapestry of global finance, the U.S. dollar has reigned supreme for nearly eight decades, serving...

TRUMP’S TARIFF TERRORISM – A SELF-DESTRUCTIVE ASSAULT ON ASIA AND AMERICA

Targeting India and China with Economic Threats, Ignoring History and Hypocrisy, While Ignoring the Coming Storm of Inflation and Job Losses

The Sabotage of India’s Economic Ascendancy: How Reservation Policies in the Private Sector Threaten National Prosperity

Let's exposes the reckless agenda of Indian political parties pushing for private sector reservations, a policy that risks plunging India into economic stagnation by undermining meritocracy and fueling caste-based division, backed by robust statistical evidence and critical analysis.