How to use Google 2-step verification with an older smartphone?

delia25

I've finally started practicing what I preach and using 2 step verification to log into my Google account since so much of my online life is so deeply integrated with Google - email, voice, wallet, play, et al. One of my Android phones is an old Motorola running 2.2 Froyo. Apparently, you can only use 2-step verification with Android devices that are after 2.3 Gingerbread. I use the old phone as a WiFi only device and not as my main phone, but it will be pretty useless if I can't log on to Google accounts. Is there a way to use the old 2.2 phone with 2-step authentication?

Topic: Security
Answer this Question

Answers

2 total
wstark
Vote Up (19)

Yes, you can still use it, you just have to set it up a little differently. You will need to get an "application specific password" or ASP when you set-up your verified devices. Go to the "authorizing applications & sites" page under Google Account settings. The set-up page for 2-step authentication will offer the option of generating an ASP and once you select it and generate an ASP you can enter it into the window that will pop up on your phone. Enter it, and you are good to go. Once you go through this process, the older phone will work just fine with 2-step verification.  I also suggest installing Google Authenticator (free from Google Play)  on your mobile device once you have completed initial set-up. Hope this helps. Google also has a page that walks you through the process.

jimlynch
Vote Up (12)

Here's some info from the Google support page:

About 2-step verification
http://support.google.com/accounts/bin/answer.py?hl=en&answer=180744

Ask a question

Join Now or Sign In to ask a question.
A file-encrypting ransomware program called CryptoWall infected over 600,000 computer systems in the past six months and held 5 billion files hostage, earning its creators more than US$1 million, researchers found.
Former U.S. Secretary of State Hillary Clinton called for a "global compact" on surveillance and the use of collected data, saying the U.S. isn't the only country that does it and American technology companies are unfairly targeted for the government's actions.
Electric carmaker Tesla Motors wants security researchers to hack its vehicles. The Silicon Valley based high-tech carmaker will hire up to 30 full-time hackers whose job will be to find and close vulnerabilities in the sophisticated firmware that controls its cars.
Two recent vulnerabilities are examples of problems that could have been avoided if we had just applied the lessons already learned in similar contexts.
Windows XP users may now download a fourth service pack for the 13-year-old operating system, but it isn't coming from Microsoft.
The growing number of data breaches resulting in massive numbers of payment cards being stolen from retail stores and other businesses is occurring because they're failing to keep up with the Payment Card Industry's data security standard, according to the PCI Security Standards Council.
Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration.
A U.S. Federal Bureau of Investigation spokesman said Wednesday the agency is working with the Secret Service to determine the "scope" of reported cyberattacks against several financial institutions.
A payment card industry security consortium warned retailers on Wednesday of the urgency to secure their systems against "Backoff," a malicious software program that steals card numbers.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+