#YubiSecure: Take your Twitter security to the next level with increased 2FA support

Great news YubiFans! As of today, Twitter made it a lot easier for you to tweet safely and keep your accounts secure. Phishing-resistant YubiKey authentication via WebAuthn is now supported on Twitter’s desktop, Android and iOS mobile applications. 

With native WebAuthn support throughout the Twitter platform, you can register and use a USB-, NFC-, or Lightning-compatible security key, like the YubiKey, directly from your mobile phone to secure your account.  

Adding a YubiKey as your primary authenticator introduces the highest level of security and convenience to your Twitter accounts, regardless of device and platform. Once a YubiKey is registered, you will be asked to either touch or tap your key to verify that it is you accessing your account.

Once authenticated, you may also have the option to make your device a trusted one by selecting “remember this device”, so your app login experience will be as simple as opening the Twitter app before tweeting away. You will only be prompted to use your YubiKey again when you log in to Twitter from a new device, which will only require a simple touch. 

To take advantage of these new features on your account, check out our latest video:

“Helping people keep their Twitter accounts secure by providing them the tools and controls they need is a top priority for us. We have been consistently improving the way people can add two-factor authentication (2FA) to their Twitter accounts over the past year and are glad to be expanding our support to enable people to use physical security keys to login to the Twitter app on mobile. We encourage everyone to enable 2FA on Twitter to help protect their account,” said Sri Harsha Somanchi, Senior Product Manager, Twitter.

Want to use a mobile device as a back-up? Set up a second YubiKey with your Twitter account using Yubico Authenticator, our time-based one-time password (OTP) app for desktop, Android, and iOS. We highly recommend disabling SMS after a security key and authenticator app are enabled to ensure maximum security. 

The Yubico Authenticator works like other time-based OTP apps with one major difference—instead of your credentials residing on your phone, they stay secured on your YubiKey and stay with you. 

Getting a new phone or laptop over the holidays? Not a problem. Yubico Authenticator eliminates the frustration of manually re-enrolling services with your authenticator app when you use a new device. All you need to do is plug in or tap your YubiKey while using Yubico Authenticator to generate your codes. 

Talk to our teamTalk to our team

Share this article:


  • Platform independent digital identity for all Many are understandably concerned that the great invention called the Internet, initially created by researchers for sharing information, has become a major threat to democracy, security and trust. The majority of these challenges are caused by stolen, misused or fake identities. To mitigate these risks, some claim that we have to choose between security, usability […]Read moreDigital IdentityEUDIFounderStina Ehrensvard
  • Q&A with Yubico’s CEO: Our move to the main Nasdaq market in StockholmAs 2024 draws to a close, it’s the perfect time to reflect on the incredible journey we’ve had this year and how it has shaped where we stand today as a company. To mark this moment, I sat down with our CEO, Mattias Danielsson, to look back on the milestones and achievements of 2024—culminating in […]Read moreCEOMattias Danielsson
  • Exploring DORA: A look at the next major EU mandateFinancial institutions have historically managed operational risk using capital allocation, but under EU Regulation 2022/2554 – also known as the Digital Operational Resilience Act (DORA) – the financial sector and associated entities in the European Economic Area (EEA) must also soon follow new rules. These new rules focus on the protection, detection, containment, and the […]Read moreDORAEU
  • Securing critical infrastructure from modern cyber threats with phishing-resistant authenticationAcross the globe, 2024 has seen a whirlwind of change. With ongoing wars, recent political change-ups and more, growth in data breaches targeting critical infrastructure continue to be on the rise. Critical infrastructure is integral to our everyday life – from the energy and natural resources powering our hospitals and providing clean drinking water, telco […]Read moreCISAcritical infrastructurezero trust