Feeds

Twitter hardens two-factor authentication with app-based secure logins

SMS, phone number no longer needed

Securing Web Applications Made Simple and Scalable

Barely two months after rolling out two-factor authentication, Twitter has beefed up its login procedures yet again, both to improve security and to make two-factor available to more Twitter users worldwide.

Twitter launched two-factor authentication in late May with a system based on SMS messaging. While that was good enough for many users, however, it did present some problems.

For one thing, verification via SMS is only available via supported mobile carriers, which isn't all of them. For another, using SMS as a security mechanism relies on the SMS delivery channel being secure, and some carriers' text messaging systems might not be.

On Tuesday, Twitter rolled out an update to its two-factor authentication scheme that can optionally make use of the Twitter mobile app for Android and iOS, rather than SMS.

"Simply tap a button on your phone, and you're good to go," Twitter security engineer Alex Smolen wrote in a blog post. "This means you don't have to wait for a text message and then type in the code each time you sign in on twitter.com."

The app approach offers other advantages, as well. Because it's based on public-key cryptography, it's inherently more secure than the SMS approach. The mobile app generates a public/private key pair and Twitter only stores the public key, while the private key never leaves the user's phone. As a result, an attacker won't be able to fake a login even if Twitter's authentication server is compromised.

When the app receives a login verification request, it will also tell you details about the browser that is being used to make the login attempt, including its approximate location – so if you see any suspicious logins from Iran, you'll know not to approve them.

The app also generates a "backup code" during the setup process, which it advises you to write down and keep in a safe place. In the event you ever lose your phone, you can use the backup code to login to Twitter, un-enroll your old phone from login verification, and enroll your new one.

As before, login verification is optional and can be enabled from any Twitter account's Settings panel. To take advantage of the new, app-based authentication process, you'll need to update to version 5.9 of the Twitter app for iOS or version 4.1.4 of Twitter for Android, both of which shipped on Tuesday. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.