• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Resources to stay safe and secure online

  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Runbox Review
    • CTemplar Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
      • NordVPN Review
      • Surfshark Review
      • VyprVPN Review
      • Perfect Privacy Review
      • ExpressVPN Review
      • CyberGhost Review
      • AVG VPN Review
      • IPVanish Review
      • Hotspot Shield VPN Review
      • ProtonVPN Review
      • Atlas VPN Review
      • Private Internet Access Review
      • Avast VPN Review
      • TorGuard Review
      • PrivadoVPN Review
    • VPN Comparison
      • NordVPN vs ExpressVPN
      • NordVPN vs PIA
      • IPVanish vs ExpressVPN
      • CyberGhost vs NordVPN
      • Surfshark vs NordVPN
      • IPVanish vs NordVPN
      • ExpressVPN vs PIA
      • VyprVPN vs NordVPN
      • CyberGhost vs ExpressVPN
      • NordVPN vs HideMyAss
      • ExpressVPN vs ProtonVPN
      • ProtonVPN vs NordVPN
      • ExpressVPN vs Surfshark
      • Surfshark vs CyberGhost
      • Surfshark vs IPVanish
    • Best VPNs
      • Best VPN for Torrenting
      • Best VPN for Netflix
      • Best Free VPN
      • Best VPN for Fire TV Stick
      • Best VPN for Amazon Prime
      • Best VPN for Android
      • Best VPN for Gaming
      • Best VPN for PC
      • Best VPN for Disney Plus
      • Best VPN for Hulu
      • Best VPN for Mac
      • Best VPN for Streaming
      • Best VPN for Windows
      • Best VPN for iPhone
    • VPN Coupons
      • ExpressVPN Coupon
      • NordVPN Coupon
      • VPN Black Friday
    • VPN Guides
      • Free Trial VPN
      • Cheap VPNs
      • Static IP VPN
      • Chrome VPN
      • No Logs VPN
      • VPN for Binance
      • WireGuard VPN
      • VPN for Linux
      • VPN for Firefox
      • VPN for BBC iPlayer
    • By Country
      • Best VPN Canada
      • Best VPN USA
      • Best VPN UK
      • Best VPN Australia
      • VPN for Russia
    • VPN Router
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • LastPass Review
    • Bitwarden Review
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • News
  • Info
    • Mission
    • Press
    • Contact
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Runbox Review
    • CTemplar Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
      • NordVPN Review
      • Surfshark Review
      • VyprVPN Review
      • Perfect Privacy Review
      • ExpressVPN Review
      • CyberGhost Review
      • AVG VPN Review
      • IPVanish Review
      • Hotspot Shield VPN Review
      • ProtonVPN Review
      • Atlas VPN Review
      • Private Internet Access Review
      • Avast VPN Review
      • TorGuard Review
      • PrivadoVPN Review
    • VPN Comparison
      • NordVPN vs ExpressVPN
      • NordVPN vs PIA
      • IPVanish vs ExpressVPN
      • CyberGhost vs NordVPN
      • Surfshark vs NordVPN
      • IPVanish vs NordVPN
      • ExpressVPN vs PIA
      • VyprVPN vs NordVPN
      • CyberGhost vs ExpressVPN
      • NordVPN vs HideMyAss
      • ExpressVPN vs ProtonVPN
      • ProtonVPN vs NordVPN
      • ExpressVPN vs Surfshark
      • Surfshark vs CyberGhost
      • Surfshark vs IPVanish
    • Best VPNs
      • Best VPN for Torrenting
      • Best VPN for Netflix
      • Best Free VPN
      • Best VPN for Fire TV Stick
      • Best VPN for Amazon Prime
      • Best VPN for Android
      • Best VPN for Gaming
      • Best VPN for PC
      • Best VPN for Disney Plus
      • Best VPN for Hulu
      • Best VPN for Mac
      • Best VPN for Streaming
      • Best VPN for Windows
      • Best VPN for iPhone
    • VPN Coupons
      • ExpressVPN Coupon
      • NordVPN Coupon
      • VPN Black Friday
    • VPN Guides
      • Free Trial VPN
      • Cheap VPNs
      • Static IP VPN
      • Chrome VPN
      • No Logs VPN
      • VPN for Binance
      • WireGuard VPN
      • VPN for Linux
      • VPN for Firefox
      • VPN for BBC iPlayer
    • By Country
      • Best VPN Canada
      • Best VPN USA
      • Best VPN UK
      • Best VPN Australia
      • VPN for Russia
    • VPN Router
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • LastPass Review
    • Bitwarden Review
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • News
  • Info
    • Mission
    • Press
    • Contact

How to Use Two-Factor Authentication (2FA) in 2022

January 10, 2022 By Heinrich Long — 46 Comments
how to use 2FA

In this guide we’re going to introduce you to two-factor authentication (2FA), and show you how to set it up for many of the most popular online services. But first, let us set the stage for this discussion.

We all know people who have had their data stolen from one account or another. Many people are victimized but don’t even know if for months due to slow or non-existent reporting by corporations and other organizations.

As we explained before,

  • Breaches of corporate databases containing our personal information keep increasing (see the Compilation of Many Breaches COMB).
  • Phishing attacks that try to trick you into giving some creep access to your data remain a major threat.
  • Ransomware attacks are aimed at everyone from individual users to large corporations and even cities.

It is clear that things need to change and we all need to up our security game.

Introduction to 2FA

While we can’t force big companies to stop being careless with the personal data they extract from us, we can improve security on our end. This is where two-factor authentication (2FA) comes into play.

As the name implies, two-factor authentication means you can’t sign into your account with just a password. 2FA blocks access to an account unless you can produce two out of three of the following factors (pieces of evidence):

  1. Something you know, like your password
  2. Something you have, like your smartphone
  3. Something you are, like your fingerprint

Most of the time, 2FA systems combine something you know with one of the other two factors. That gives you something non-physical (the password) and something physical (the smartphone). This approach makes your accounts much more secure.

ATMs use a form of 2FA. You need both your PIN (something you know) and your bank card (something you have) to get into the account.

Think about these scenarios:

  • A creep watches over your shoulder as you log into your email at your favorite café. He now knows your login information. If your account isn’t protected by 2FA, he is going to be reading your email before you finish your latte. If the account is protected by 2FA, he still can’t get in. That’s because he would also need the second, physical factor.
  • A pickpocket on the train steals your wallet, including your ATM card. Because ATMs use 2FA, he still can’t steal your money because the card is only one factor. He would also need your PIN or password to get at your money.

Will 2FA make my accounts more secure?

This sounds promising, but does the hassle of having to use 2 factors all the time produce any benefits in the real world?

The answer is a resounding, YES!

Last year, both Google and Microsoft published reports showing that 2FA, while not a perfect shield against attacks, is incredibly effective against automated attacks.

In May, the Google Security blog ran a post that showed that using on-device prompts (a simplified form of 2FA), “helped prevent 100% of automated bots, 99% of bulk phishing attacks and 90% of targeted attacks.”

In July, the Microsoft Azure Active Directory team published a report based on their experiences defending against hundreds of millions of password-based attacks a day. You can read the full report here if you like, but for our purposes, all you really need to know is that the team found this:

Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA. [Multi-Factor Authentication]

That sounds pretty convincing to us.

How does 2FA work? Is it a hassle to use?

You now know the concept behind 2FA, but we haven’t yet talked about how it actually works in practice. Think again about using your favorite ATM. You insert your card, then you enter your PIN, then money comes pouring out.

In this case, the hassle is minimal. If you have your card in hand, and remember your PIN, it only takes a few seconds more to use the ATM’s 2FA system than it would if you only needed one factor to log in. But that’s because the ATM has a nice card slot and numeric keypad right there for you to use.

2FA with credit card

The hassle level goes up when you want to use 2FA with accounts you access from your computer or mobile device. Why? No card slot or handy keypad for entering PINs.

Without those, system designers needed to get more creative. They came up with four ways to provide that second factor.

Two-Factor Authentication methods

When you aren’t using an ATM or a retinal scanner or similar special 2FA hardware, there are four commonly-used 2FA methods:

  1. Test messages (SMS)
  2. Authentication apps
  3. Security keys
  4. Backup codes

Let’s go into a little more detail on each of these.

1. Text messages (SMS)

When you enter your password on a site that uses text messages for a second factor, the site sends a text message containing a numeric code to your telephone. You need to enter this code at the site to provide the second factor and complete the login process.

Text messages are easy to set up and use, but SMS is not very secure. Hackers may be able to intercept text messages being sent to your phone.

There have also been cases of social engineering where hackers have convinced a phone company to transfer your telephone number to a phone in the hacker’s possession. This potentially gives the hacker access to every account you have that uses SMS for authentication.

2. Authentication apps

Authentication apps are apps that reside on your smartphone. Unlike the text message method, using an authentication app doesn’t rely on receiving a code sent by the service you want to log into.

Instead, the app generates an authentication code itself. When you first configure an authentication app to work with a specific service, the app and the service exchange a secret code (we’ll talk about how that happens later).

Using that secret code and the current time (smartphones have very accurate clocks built into them) the app generates an authentication code for you to enter into the service when required. Apps generate new codes every 30 to 60 seconds and need to be entered before they expire.

Because the authentication codes are generated using the saved shared secret and the time, the app doesn’t need a data connection to function. In fact, it doesn’t even need cell service.

To use this method you will need to install an appropriate authenticator app on your phone. We say appropriate because some sites require you use a specific app. While Google Authenticator is probably the most popular and widely-used app, some sites require you to use an alternative such as Authy or Microsoft Authenticator.

Setting up your authenticator to work with a site usually involves scanning a QR code containing the shared secret with the phone’s camera.

3. Security keys

Security keys are physical devices that can take the place of authentication apps. They are tiny physical devices that typically plug into a USB port on your device, for example, Yubikey. Some also have Bluetooth or NFC capability, allowing you to use them without physically plugging them into your computer or phone.

These keys can eliminate much of the hassle of 2FA. Once set up, all you need to do is plug in the key and touch the button on it whenever you need to authenticate.

As long as you have your security key, you don’t have to worry about receiving SMS messages or whether the authentication app on your smartphone is working. You don’t even need to have a smartphone. This is a really secure 2FA factor.

But nothing is perfect. Drawbacks of security keys include the fact that you need to buy them, you need to have it with you whenever you plan to log into a protected site, and they are not yet compatible with every 2FA capable system out there.

4. Backup codes

In addition to the factors mentioned so far, some sites and services create backup codes. Backup codes are one-time codes that you can use to get into your account when you don’t have access to any of the other 2FA methods (your phone is broken or your security key was stolen). Some secure email services utilize recovery codes, as we noted in the Tutanota review.

If a site or service offers to generate backup codes for you, you should take advantage of that. Generate the backup codes and store them somewhere safe like in a good password manager. That way, if you do lose your ability to use any of the other factors, you can still log in and take steps to correct the situation.

What’s the deal with those black squares (QR codes)?

Once you start setting up 2FA on your accounts, you are sure to run into those weird black squares called QR codes. QR (Quick Response) codes are a type of barcode that can be read by many types of devices, including your smartphone. These codes are how an authentication app can share a secret with a site or service.

When  a service displays one of these black squares, tell the authentication app on your phone you want to add a new code. The app will activate your phone’s camera. Point it at the QR code and the app will use the information contained in the code to configure the app.

This is much easier and more accurate than copying a long string of random characters (the shared secret) into the app by hand.

Which 2FA authentication method is best?

There is no one authentication method that is best across the board. You are of course limited by the methods that a particular service supports (few support all four).

And you are limited by the tools you have available and the circumstances under which you will be logging in to the service. If you will need to log in from a location where you don’t have cellphone service, SMS (text messages) will be of no use. And if you don’t have access to a security key, you are out of luck there.

The best we can do is give you some general guidelines:

  • Text messages (SMS) are the least secure method. While it is better than nothing, choose one of the other methods if possible.
  • Authentication apps are secure, and a good choice if you will have your smartphone available whenever you need to log in.
  • Security keys are the most secure option, if you can be sure to always have the key available when you need to log in (and never lose it).
  • Backup codes are just that, backups for when you don’t have access to any of the other options. Remember that they are one-time codes, so only use them in emergencies.

Final questions before getting started with 2FA

Here are a few more common questions we hear related to using 2FA:

Do I really need to do all this every time I log in?

Once you enable 2FA on an account, you have to provide that second factor whenever it is requested. Some services require you to use the second factor every time you log in.

Others let you opt out of using the second factor on specific web browsers or devices. There will be some kind of message to that effect if you can do so.

What if I don’t have my phone on me?

Backup codes are the answer for those times when you don’t have your phone on you.

What happens if I forget my password or get locked out of my account?

Each site has its own procedures for what happens if you forget your password or get locked out of your account. Somewhere during the recovery process you will still need to use that second factor to confirm your identity, so make sure you have it available when you begin the process.

How do I transfer my 2FA accounts to a different phone?

If you are using SMS text messages for 2FA, moving your accounts to a different phone is easy if you can transfer your phone number to the new phone. Your SMS messages will start appearing on the new phone as soon as the number gets transferred.

If you will be changing phone numbers, you will have to go in and set up the new phone number on all of your services while you still have access to your accounts using the old number.

If you are using an authentication app, you will need to check out their instructions for making the transition. For example, in May 2020, a new version of Google Authenticator arrived on the scene. One of its new features is the ability to move your 2FA codes (Google calls them 2SV codes) across Android devices.

How to set up 2FA on your favorite sites and services

Now that you have all the background information, it is time to start activating 2FA. But if you think about how many things you need to protect, you probably have two more questions:

How do I know which services support 2FA?

2FA is common enough these days that you can assume most services support it. We’ve covered many of the most popular services right here in this post. If you don’t find a service you are interested in here, your next step should probably be to check a site called Two Factor Auth. They list a massive number of sites that support 2FA, organized into categories like Banking, Social, Education, and many more.

Finally, if a service is really important to you and you don’t find it either here or over at Two Factor Auth, you could contact their Customer Support team and dig around a bit on their Help pages. Not every service is good about updating their website, and it is worth taking a look if the service is one you really want to protect.

Which services should I protect first?

We suggest you start with your password manager. With all your passwords stored in one place, your password manager is a high-value target for hackers.

After that, your email accounts are a good next step. Anyone hacking into your email would have access to a vast amount of your personal information, and could use your account to cause all sorts of trouble for everyone in your address book too.

Next, we recommend any service that has a copy of your credit card information. You don’t want someone to start buying stuff on your dime.

Then there is social media. Like your email accounts, your social media accounts are stuffed full of personal information that bad guys would love to get their hands on, as well as connections to all your friends and family. (The best option is to simply not use social media, which is just a data collection tool to profit off ads.)

Last but not least, see if any of your banks or other financial service companies have 2FA support. You would think that these folks would be at the top of the list for protection, but most of these organizations have their own techniques to prevent fraudulent use. If you’ve ever been locked out of your bank website when using a new browser, or found your credit card blocked when you tried to use it on vacation, you’ve run into one of these systems. While running afoul of these systems is a huge pain in the neck, the bank or credit card company is protecting your account for you.

One last thing before we get into the 2FA-ing of your life: while we have been using 2FA throughout this guide, various services use various names for the same basic system. Google calls it 2-step verification. Other services use their own variations. It all means using two factors to protect your account access.

How to use 2FA with your accounts

Instead of trying to come up with an elaborate organizational scheme for all this, we opted for simplicity: the services and accounts that follow are listed in alphabetical order.

Amazon: Two-step verification

Amazon logins affect not just the giant online store; they also control access to services like Audible.com. Setting it up is quick and easy:

Go to Amazon.com on the desktop and log in to your account. Click Accounts & Lists. In the menu that appears, click Your Account. On the Your Account page, click Login & security. On the Login & security page, find the Two-Step Verification (2SV) Settings and click the Edit button.

Amazon will demand that you enter your password again to continue to the Two-Step Verification (2SV) Settings page.

Amazon 2FA

Click the Get Started button to, well, get started. Select one of the two options: Phone Number or Authenticator App. Follow the on-screen instructions to set up either of these. Unfortunately, you won’t be done quite yet. As it says on the page, “Just two more important things to know.”

amazon 2 factor authentication

Once you are done with those two important things, you can hit the Got it. Turn on Two-Step Verification button and get on with your life (or the next service you want to set up for 2FA!).

Bitwarden: Two-step login

Bitwarden is one of the best password managers and is a great place to store not only all your passwords, but all those backup codes you are accumulating as you activate 2FA on your favorite services. This makes it all the more important to do everything you can to protect your Bitwarden account, and implementing two-step login is the way to do it.

As befits a high-value, high-security service, Bitwarden offers a wide range of second factor methods for securing your account.

If you are using the free version of Bitwarden, you can use an authenticator app, or email (one option we seldom see) for your second factor.

If you use the premium (paid) version, you can also use pretty much any type of security key on the market.

Beyond that, you can enable more than one of the two-step login methods.

how to set up 2FA

As you can see, it is a wealth of options, but Bitwarden provides detailed instructions for any and all of the supported methods, so just make your selections and follow the instructions.

Dropbox: Two-step verification

If you are like most people, you find it much easier to accumulate stuff in your Dropbox account than to clean out the stuff you no longer need. That tendency makes cloud storage services like Dropbox ideal targets for hackers. Activate Dropbox two-step verification to protect yourself from those creeps. This is how it’s done:

Log into Dropbox on the desktop. Click your icon in the top right of the window, then Settings in the menu that appears. This takes you to the Personal Account page, where you’ll want to select the Security tab. Scroll down to the Two-step verification section and set the slider to On.

Click the Get Started button in the information box that appears. Enter your password then click Next. Select one of the two options Dropbox presents: Use text messages or Use a mobile app, then hit Next and follow the instructions to complete the two-step verification process.

You’ll get the chance to enter a backup phone number to receive codes in case you lose your primary security code source. You’ll also get a bunch of one-time backup codes which you’ll want to record in case you need them some day.

Note: Do you want a more secure and private cloud storage service? We’ve ranked the best cloud storage services with a focus on privacy and security.

Evernote: Two-step Verification

Evernote has been around for a long time, which you can tell if you look at the desktop app. It is another good target for bad people, and is often connected to a lot of other apps. This means both that you really need to enable two-step verification and that a lot of associated products could be affected when you do. Microsoft is well aware of this, and as you will see shortly, they have all the bases covered.

Here’s how to use 2FA with Evernote and related products.

Start by logging in to the Evernote website using a desktop browser. Once you see Evernote on the screen, click your icon on the top left of the Evernote window. Click Settings in the menu that appears. When you arrive at the next page, click Security Summary in the menu running down the left side of the window. This takes you to the Security Summary page.

Click the Enable link in the Two-Step Verification section of the page. Evernote displays excellent instructions that explain everything and walk you through the steps.

evernote 2fa

You’ll need to enter a phone number to kick things off. Not surprisingly, an authentication app is the recommended method for verifying identity. But in a strange twist, receiving text messages is only possible if you have a paid Evernote premium account. That seems backwards to us, but what can you do?

There are a couple of kinks to the way 2FA works for Evernote. The one particularly annoying kink is that some or all of the apps attached to your Evernote will start demanding verification codes as soon as Evernote does. In a good kink (or just a smart adjustment), Evernote can generate whatever you will need to continue to get access to the apps attached to Evernote. Evernote will serve you four backup codes during the configuration of 2FA.

IMPORTANT: Make sure you record the backup codes that Evernote gives you. It will likely ask you a question about one of those codes before you can finish 2FA setup.

Facebook: Two-factor authentication

Facebook’s two-factor authentication system will request your password and a verification code whenever someone tries to log in from an unrecognized device or web browser.

To set up 2FA for your Facebook account, click Settings, then in the menu on the left side of the page click Security and Login. On the Security and Login page, scroll down and click the Use two-factor authentication Edit button.

Facebook 2fa

Select the Security Method you want to use (authenticator app, or SMS text message), then complete the steps to protect your Facebook account.

Google services: 2-step verification

The Google 2-step verification system works with everything from your Gmail account, to the Google Play store, to YouTube (which also belongs to Google).

To set it up, go to this page, click the Get Started button, and follow the instructions. Google offers you several different types of second steps to complete the authentication.

google 2 step verification

The default option is called Google prompts, which opens a prompt on your phone where you can simply tap Yes to confirm your identity and sign in to the service. Other types of second steps are available: voice or text messages, authenticator apps, security keys, and backup codes.

During sign-in, you can reduce the future hassle factor of 2-Step Verification by setting Google to skip the verification for that particular device in the future. This is safe to do because someone trying to log into your account using a different device would still have to complete the verification process.

If you need to make any adjustments to your 2-Step Verification settings, devices, you can do it by visiting this page.

Instagram: Two-factor authentication

Not surprisingly (since Instagram is a Facebook product) setting up 2FA on Instagram is very similar to doing so on Facebook. It will request verification whenever you log in from a phone or computer that Instagram doesn’t recognize.

Note: You’ll want to set this up on your mobile rather than on your desktop, since the desktop version doesn’t support Authentication Apps for some reason.

So open the Instagram app on your phone and tap the hamburger menu in the top right of the app window. Next tap Settings, then Security. In the Security menu, tap Two-Factor Authentication.

Tap Get Started to go to the Choose Your Security Method page. Your options are text message or authentication app. We recommend the authentication app. Follow the instructions that appear on the screen carefully and the Instagram app will set up your choice of authentication app (Google Authenticator or Authy) for you.

LinkedIn: Two-step verification

LinkedIn offers a basic two-step verification system without a lot of options. You can configure it from the mobile app or the desktop. The desktop is the best bet, particularly if you choose to use an authenticator app, since you will be able to use your phone to scan the QR code.

To set up LinkedIn two-step verification on the desktop, start by clicking the Me menu, then Settings & Privacy. On the page that appears, select the Account tab, then Two-step verification. When the option appears to do so, click the Turn On link. You get the choice of two methods: authenticator app, or phone number (SMS).

2FA LinkedIn account

Choose your option in the menu and click Continue. LinkedIn will ask you to enter your password once again, then walk you through the setup for the method you chose. Follow the steps and you are ready to go. Note that LinkedIn will send you an email reminding you that you have successfully turned on two-step verification.

MEGA.nz: Two-factor authentication

MEGA is one of our favorite cloud storage services and it performed well in our MEGA review. Everything you store on MEGA is securely encrypted, but that won’t matter if someone gets their hands on your password and you don’t have 2FA activated. So let’s do that now.

To activate 2FA, log into your MEGA.nz account and click your name in the top-right corner of the window to open your Account page. Next, click Security in the menu running down the left side of the page. On the Security page, find the Two-Factor Authentication section and slide the toggle switch to On. MEGA only supports using authenticator apps. They also give you a file you can download with your recovery key.

mega 2fa two factor authentication

Make sure to store this in a safe place (like your password manager) so you can regain access to your account if you get locked out.

PayPal: 2-step verification

PayPal has all sorts of financial information and resources that a crook would love to get his or her hands on. If you are a heavy user of this service setting up 2-step verification should be a priority.

To start, hover the cursor over your name in the top-right corner of the PayPal window and select Profile Settings in the menu that appears. Scroll down to 2-step verification and click Update.

PayPal takes you to the 2-step verification and gives you a choice of three methods: text messages, authenticator app, or security key. Select the option you want then click Set It Up and follow the instructions. At the end of the process, PayPal gives you the option to set up a second authentication method as a backup.

paypal 2sv

Pinterest: Two-factor authentication

Pinterest 2FA is quick and easy to set up too — but there is a surprise twist at the end. Let’s see what this is all about…

Here’s how to use 2FA with Pinterest: Sign in to Pinterest on your desktop and click the down-arrow icon in the top right of the Pinterest window. In the menu that appears, click Settings, then Security.

pinterest 2fa

Check the Require code at login box, then enter your password when requested and click Next.

Now you get the unfortunate surprise.

Pinterest only supports SMS messages for 2FA. So enter your Country code and a telephone number that can receive text messages to complete the process. Pinterest will send you a message with a confirmation code to enter.

They will also send you a backup code you can use to get back into Pinterest if you find yourself unable to receive SMS messages for any reason.

ProtonMail: Two-factor authentication

ProtonMail is one of our top picks for a secure email service. If you use it, we urge you to activate two-factor authentication and make your email account as safe from attack as possible. Note that you must use an authentication app for ProtonMail 2FA.

To enable 2FA on ProtonMail, log in to your account using the webpage (mail.protonmail.com). Once there, click the Settings icon. On the page that appears, click the Security option in the menu on the left side of the page. On the Security page, click the Enable Two-Factor Authentication button. ProtonMail provides a nice wizard that walks you through the rest of the process. They also provide you with 16 recovery codes. (See our ProtonMail review for more details.)

Reddit: Two-factor Authentication

Reddit has one of the easiest 2FA setup processes you will run into. It goes like this:

Log into Reddit on your desktop and click the menu icon in the top-right corner. In the menu that appears, click User Settings. On the User Settings page, select the Safety & Privacy tab. Scroll down to Use two-factor authentication and activate it with the slider next to it. This opens the Set up two-factor authentication dialog box, where you will first have to enter your Reddit password.

Reddit only gives you one option here: use an authenticator app.

reddit 2fa

Surfshark VPN: Two-factor authentication

Surfshark is one of the best VPN services that we have tested. And they are in the forefront of VPN support for two-factor authentication. They support two methods: authenticator app, and email.

We were going to explain how to set up 2FA here, but Surfshark has the whole thing laid out for you, including short video clips that walk you through the entire process.

Twitter: Two-factor authentication

Twitter is nice in that you can set up 2FA on either the desktop or the mobile app. Even nicer, the steps are the same for either type of device.

In the side menu, select Settings and privacy (you might need to select More to find it). On the Account page that appears, select Account, then Security. On the Security page, select Two-factor authentication.

Twitter lets you use any of the three main authentication method: text message, authentication app, or security key. Select the option you wish to use, then follow the instructions that appear.

Once you complete the 2FA steps, new options will appear on Twitter’s Two-factor authentication page:

twitter 2fa

Record some backup codes to get access to Twitter if you don’t have your phone handy for 2FA responses. Create a 1-hour temporary password for third-party apps and services that you can’t log into otherwise.

WhatsApp: Two-step verification

WhatsApp uses two-step verification to register your phone number with WhatsApp again, such as if you were to log out of WhatsApp or want to switch to a new phone. Even if you are using something like web.whatsapp.com, you can only set this up using the mobile app.

To set it up, tap the three-dot menu icon on the top-right of the WhatsApp window, then Settings, then Account. In the Account menu, tap Two-step verification. On the page that appears, tap the ENABLE button to start the process.

First, you will need to create a six-digit (not the usual four) PIN that you must use to register your phone number with WhatsApp in the future.

Next, you will need to give WhatsApp an email address they can use to reset your PIN if you forget it.

Complete those steps and tap the DONE button. But you are not quite done after all. WhatsApp throws up one more page that gives you the chance to disable two-step verification, change your PIN, or change your email address. Tap the back arrows a few times to get back to your WhatsApp-ing.

Don’t be surprised if WhatsApp asks you for your PIN every so often. The idea seems to be that if they keep making you enter it, you will eventually memorize the thing.

Conclusion on using 2FA in 2022

While it can be a bit of a hassle, using Two-Factor Authentication (2FA) has been shown to greatly reduce the risk of your accounts getting hacked.

When you consider how big of a pain it can be to get one of your accounts hacked, we think you will agree with us that putting up with the small, nagging pain of 2FA is better than the massive, stabbing pain of getting one of your important accounts hacked.

So take a deep breath, charge up your smartphone, and roll up your sleeves. If it is any consolation, we’ve heard that all the smart kids use 2FA now, so at least you’ll be in good company.

This Two Factor Authentication guide was last updated on January 10, 2022.

About Heinrich Long

Heinrich was born in a small town in the Midwest (USA) before setting sail for offshore destinations. Although he long chafed at the global loss of digital privacy, after Edward Snowden’s revelations in 2013, Heinrich realized it was long past time to join the fight. Heinrich enjoys traveling the world, while also keeping his location secret and digital tracks covered.

Reader Interactions

Comments

  1. Mike

    March 18, 2022

    More good news! Another open source 2FA app for iOS named Raivo OTP:

    https://apps.apple.com/us/app/raivo-otp/id1498497896

    https://github.com/raivo-otp

    Reply
  2. Mike

    March 11, 2022

    Great news for iOS users! Tofu Authenticator is a free and open source 2-factor authentication app for use on the iOS devices!

    https://www.tofuauth.com/

    Reply
  3. S

    January 2, 2022

    1) Does anyone have any experience / recommendations re freeotp for Iphone? I’m not an iphone user but someone in my family is. What I’ve read is freeotp is opensource, developed by Red Hat. Has any comments re ease of backup and restore?

    2) Has anyone any comments re the effectiveness of LastPass Authenticator which it seems offers push notifications for services that offer push notifications when 2FA app protected?

    Reply
    • S

      January 10, 2022

      To add to the above:

      3) Is FreeOTP still under development? When I look here in Github, there does seem to be much happneing:

      https://github.com/freeotp

      4) In contrast, the fork named FreeOTP+ looks like it has much more happening. However it seems this is Android only

      https://github.com/helloworld1/FreeOTPPlus

      Reply
  4. S

    January 1, 2022

    Hi Heinrich and Sven,

    It would be interesting to read in the article where email fits in terms of security as a 2FA factor please?

    Reply
  5. Polar Beard

    September 6, 2021

    Thanks to all who post. This site is always a beacon of clarity in my quest for privacy.
    I have been researching 2FA apps for over a week, looking for one that meets these criteria:
    – works on iPhone and Mac (I do most things on desktop, feel it’s more secure)
    – works with most major sites, e.g., Amazon, Pinterest, Proton Mail (my bank only offers SMS and phone verification!)
    – has some support availability (chat/e-mail)
    – reliable, not too many bugs
    I was going to use Authy, but then saw the reviews above. Authenticator app sees not reliable, and Step Two looked good but it only works on Big Sur, and I’m waiting till more of the bugs are worked out.
    What’s a guy to do?
    Thanks in advance for any feedback.

    Reply
    • Mike

      September 9, 2021

      Since you use iOS, I suggest you use Bitwarden. I have used Bitwarden for years and it is terrific. It is not only a top-notch password manager, it is open source, has strong encryption and you can use it for 2FA. That feature may only apply if you are a subscriber and, if so, it is only $10US annually. It is the best all around password manager and 2FA app that suits the needs you describe.

      https://bitwarden.com

      Reply
      • S

        January 1, 2022

        Hi Mike,

        Does it worry you that if the Bitwarden account gets compromised, the villain can access:

        1) The list of user credentials stored within Bitwarden password manager. And;
        2) The totp tokens that are supposed to 2FA protect the accounts stored within Bitwarden?

        Reply
        • Mike

          March 11, 2022

          @S Sorry for the late reply. I am not due to Bitwarden’s strong encryption and am careful about using it. I do not use Bitwarden for 2FA, but (until recently) it was the only app I knew of that was a decent 2FA and password app for iOS. I personally use andOTP for 2FA.

          No matter what 2FA app someone uses, as long as a user uses a strong password to access Bitwarden and is careful, I doubt they will have any problems.

  6. a55

    July 12, 2021

    Again thank you Heinrich for really good overview.
    I just thought I’d share something I learnt the other day.
    One major worry about using 2FA generating the 6 digit OTP code with say a smartphone is … what happens if I lose the smartphone, it gets stolen or breaks? I could be locked out of various accounts 🙁 hence would be good to have 2FA enabled on 2 devices, say my phone and on my computer (or tablet) just incase I lose access to one of them!

    Note that some providers (for example Tutanota) will allow you to add several 2FA devices to an existing email account, but others (seems the majority, certainly Paypal, Protonmail, Mega etc) will only allow one ‘setup’ for 2FA – so what to do if you want to have 2 devices generating OTPs?

    I accept that there are backup codes.. but it is actually quite straightforward to set up 2FA for OTP on 2 devices, but takes a little bit of preparation:

    step 1: if you already have set up 2FA on one device, you need to delete this particular setup/device from the website and start afresh.
    Step 2: have both of your devices ready (smartphone plus PC/laptop/tablet)
    Step 3: scan in QR code with smartphone AND tablet ; if you want to use a PC/laptop as second device you obviously need to copy and paste the string of random characters (the shared secret) into your authenticator program that works on your PC/laptop.
    Step 4 – you might need to re-enter on the website the generated OTP as confirmation; (obviously the codes generated on both devices will be identical!)

    so you now have 2 devices, say a primary device like your smartphone and a secondary one (like a tablet or PC) generating identical OTP codes for 2FA.

    If you want to avoid Authy, Google authenticator (I am sure good to avoid both of them!) on android I use FreeOTP (this is made by RedHat but I think open source); apparently ‘andOTP’ is excellent including offering cloud backup;
    For Linux desktop I just discovered ‘Authenticator’ , again Open source, (you can find it by searching for Authenticator and Elmoussaoui on gitlab.gnome website) install via Flatpak. Really neat program!

    (alternative password managers like KeepassXC also calculate OTP, but like someone pointed out in the discussion, probably best to keep the OTP generation separate from where you store your actual passwords – unless maybe you have say a second Keepass file just for OTPs?)

    Reply
    • S

      January 1, 2022

      Hi a55,

      The concept you raise is very important.

      1) Authy forces users to create a ‘backups password’ when setting up Authy on a phone. This makes it easy to move the totp tokens to another device giving the option of a backup device. Authy also have a recovery process on their website for the event of a lost device.

      2) Microsoft Authenticator has a ‘Cloud backup’ feature in settings. This feature is disabled until the user uses MS Authenticator to 2FA protect a personal Microsoft account (e.g. outlook.com, live.com, hotmail.com). Then in the event of a lost or inaccessible device, recovery can be actioned to the personal Microsoft account that is specified when enabling ‘Cloud backup’. Please note the wording, ‘personal Microsoft account’; ‘cloud backup’ isn’t enablable by adding a work or school Microsoft account to Microsoft Authenticator on the device. That is since work and school accounts for most people are not life long. Hence, Microsoft do not allow work or school Microsoft accounts to be used for Microsoft Authenticator cloud backup (to mitigate risk of a closed loop being generated by someone no longer being able to access the Microsoft account to which the cloud backup takes place). Hence why a personal Microsoft account must be added to Microsoft Authenticator for ‘cloud backup’ to be enabled.

      3) Aegis, as already mentioned on this webpage, in contrast to the above 2 products has the attraction of Aegis being open source. Aegis is only available (currently at least) for Android. Aegis has a feature that enables a backup to be generated every time there is a change to the list of accounts protected by Aegis. The backup gets added to a location on the Android device that gets specified by the user. Is there a way for the backup file to then be automatically copied from the Android device to cloud storage? When I look in online Android documentation…

      https://support.google.com/android/answer/2819582?hl=en

      …it seems pics and images will automatically backup to cloud storage. However, backup of other files from Android to cloud storage seems to require an element of human intervention. Can anyone advise please, is there a relatively easy way around this so that the Aegis backup is copied automatically from the Android device to some sort of cloud storage product(s) (this doesn’t have to be Google drive, something like Mega would be great)?

      Reply
  7. Mike

    July 9, 2021

    FIDO Keys won’t entirely replace passwords so don’t delete your password manager yet.

    https://arstechnica.com/information-technology/2021/07/why-the-password-isnt-dead-quite-yet/

    Reply
  8. O.

    June 13, 2021

    What About Duo Mobile can you trust them

    Reply
    • Mike

      June 17, 2021

      They’re not open source so I would not.

      Reply
      • O.

        June 20, 2021

        What 2FA app do you recommend

        Reply
        • Mike

          July 7, 2021

          If you have Android, andOTP and AEGIS are the best I have used so far. Both are free, open source, available on Google’s Play Store and F-Droid. Also, Bitwarden can be used a 2FA app too. But my understanding is that you have to be a paid subscriber to get that feature.

          If you have iOS, I would use Bitwarden and be a yearly subscriber. Bitwarden is not only a top-notch password manager but the fact that you can use it for 2FA is a plus is my book.

  9. Matt

    February 6, 2021

    Which are the best 2FA apps to use on Android?

    Reply
    • Mike

      June 4, 2021

      I would say andOTP and AEGIS. Both are free, open source, available on Google’s Play Store and F-Droid. Also, Bitwarden can be used an a 2FA app too. But my understanding is that you have to be a paid subscriber to get that feature.

      Reply
  10. I.

    September 25, 2020

    What about OTP Auth for iOS? Has anyone experience with it?

    Reply
    • Mike

      June 4, 2021

      I do not. If I was using iOS, I would use Bitwarden as a 2FA app. However, to get that function, you have to be a paid subscriber. But for $10 a year you also get a password manager that is has just as good or better features than other high-priced ones that are proprietary software like LastPass or Dashlane.

      https://apps.apple.com/us/app/bitwarden-password-manager/id1137397744

      Reply
  11. I.

    September 25, 2020

    Thank you Heinrich for the article!

    I just have one question: Some password managers, e.g. Bitwarden, offer the possibility to generate and store OTP for 2FA from within the App.
    To me, it doesn’t sound like a clever idea to save both the password and the OTP in the same App. The point of 2FA is to use two different methods, right?

    What are your thoughts on that? Would you recommend using it?

    Reply
  12. joe

    July 30, 2020

    Authy is a nightmare for your privacy. Read their policy. They openly write their business model is to collect your personal data and share it to third parties. The data they collect includes your phone number, type and identifier of your device , email address, IP address, and geolocation. From time to time, their support team may require you to provide identity information like a drivers’ license, national ID or passport. Of course, it all comes under the guise of taking care of your safety.

    Reply
    • Feex

      July 31, 2020

      And what do you recommend to use? Because I don’t see many secure open source applications, they are all offline and that is a serious problem if you lose your backup copy of your key, you lost.

      Reply
      • joe

        July 31, 2020

        I don’t think I’m at liberty to recommend anything. Just a warning. And I keep a backup of my passwords and TOTP codes in a separate KeePassXC file in addition to my main password manager.

        Reply
      • Cupid

        September 19, 2020

        I can recommend Aegis for sure. You can create encrypted backups whenever you change database and keep it on 3 sites- 2 offline devices and 1 online cloud.

        Reply
      • cupid

        September 19, 2020

        And there is Oathtool also if you don’t want to share data with your android (I strongly hate Androids, you may never know what is going on with your Android)
        https://www.nongnu.org/oath-toolkit/man-oathtool.html

        Reply
    • JOSH

      July 31, 2020

      What 2fa application do you use?

      Reply
    • J.M.

      August 5, 2020

      @joe

      Try Aegis. It is off F-Droid. Ran it through ClassyShark3xodus and there are no trackers (the Classy Shark comes off F-droid as well).

      It does offer encryption and hidden codes that you can use. Just an option.

      Reply
      • cupid

        September 19, 2020

        This suggestion brings me to an important thing-
        What is the best way of blocking trackers and use Android applications?

        Reply
        • Mike

          June 4, 2021

          Use an open source no-root or non-jailbreak firewall. I suggest NetGuard for Android:

          https://netguard.me/

          I suggest Lockdown for iOS:

          https://lockdownprivacy.com/

  13. $£

    July 14, 2020

    To Dere
    Is not the difficulty or disadvantage with Authy is that it is not open source and they could be not telling the truth about truly encrypting our OTP?
    Otherwise I agree that it makes sense to use a multi-platform app in case one loses his primary device.

    Reply
  14. A Non-Human Being

    July 12, 2020

    I’ve found Aegis to be the most secure 2FA app, although you have to be extremely careful as if you lose your device then you are practically doomed lol. But Aegis does offer a backup in case, still be careful…

    Reply
    • jack0

      July 31, 2020

      Where is the company from? and the creators because on your page Aegis more information is missing, little serious is

      Reply
  15. Sam

    July 12, 2020

    Hello Sven! I was wondering if there is a way to subscribe to a newsletter so I can get an email every time a new post comes out? I only just found out about this article

    Reply
    • Sven Taylor

      July 13, 2020

      Hey Sam, we’ve thought about a newsletter and will investigate the options.

      Reply
  16. Just a guy

    July 11, 2020

    “Authentication apps are secure, and a good choice if you will have your smartphone available whenever you need to log in.”

    Authy works on Windows 10 too, so no smartphone is necessary when you use Authy for 2FA.

    Reply
  17. ^6

    July 11, 2020

    Thanks for the OTP Aegis. Will check out.

    Reply
  18. Mike

    July 10, 2020

    Two excellent 2FA apps for Android that are also free, open source and can be set up for password protection are andOTP and Aegis. I am unsure of iOS has any similar ones.

    Reply
    • Dere

      July 12, 2020

      My recommendation is to migrate to “Authy” is the safest. By using this application I lost 5 accounts and with important information, serials of programs that I had bought for life had more than 14 years some emails. Including coinbase, binance accounts, some accounts had bitcoin with those email, blog and adsense. My cell phone was an android, the encrypted microsd and for not making a backup, due to my mistake of forgetting, I lost all those accounts. So better to use an application that has backup in the cloud and offline and the best is ¨Authy¨ for now. Recommendation never use offline 2FA application.

      (Sorry for my English, some words of a capable translator do not translate them correctly.)

      Reply
      • Mike

        July 14, 2020

        Thank you. I did use Authy for a short time but stopped because it is proprietary and not open source. There is no way for anyone to review the source code to see if the app is secure and if the maker(s) have messed around with it to do anything to invade a user’s privacy.

        I have used Aegis along with andOTP and find both of them to be very secure and of excellent quality.

        Reply
        • Marc

          September 9, 2020

          What would you recommend using for iOS devices?

  19. $4

    July 10, 2020

    Thank you. May I suggest that if time permits you could write up a guide on use physical key devices?

    Reply
  20. JuhaT

    July 10, 2020

    I just love Bitwarden’s 2FA. I have configured my mouse (Logitech G602) to have one button to paste in the username/password and one to paste in the 2FA code when asked. Logging in on sites is a breaze nowadays.
    I also have all 2FA’s in Authy too for backup or when I’m on the road. I have Yubikey too but dont use it much, mostly because it is so much more convinient with Bitwarden and not much of what I use do not have Yubikey option. I dont know if it is just me but I have noticed that logging into Gmail with Firefox it wont recognize Yubikey. And this happens only on Gmail. Works fine in Chrome, makes me wonder if Google doesnt like people using Firefox so they make it hard for Firefox users?.

    Reply
  21. 4$

    July 9, 2020

    How to use 2FA without giving them your phone number or email for privacy purposes? Would using an authenticator app be the solution? Even if it is a google one?

    Reply
    • Sven Taylor

      July 9, 2020

      Or a physical key device, like Yubikey.

      Reply
    • Meon

      January 11, 2022

      According to Rob Braxman Google authentication (and many Google apps) will read the IMEI code of your phone, and send it to Google. The IMEI code then reveals your real identity to Google.

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RestorePrivacy Checklist

  1. Secure browser: Modified Firefox or Brave
  2. VPN: NordVPN (68% Off Coupon) or Surfshark
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: Mailfence or Tutanota
  5. Secure Messenger: Signal or Threema
  6. Private search engine: MetaGer or Swisscows
  7. Password manager: NordPass or Bitwarden

Support this Project

RestorePrivacy was created to provide you with honest, useful, and up-to-date information about online privacy and security topics. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), and sharing this information with others. See our mission here.

RestorePrivacy is also on Twitter

We’re available for Press and media inquiries here.

COPYRIGHT © 2022 RESTORE PRIVACY, LLC · PRIVACY POLICY · TERMS OF USE · CONTACT · SITEMAP