How to use Google 2-step verification with an older smartphone?

delia25

I've finally started practicing what I preach and using 2 step verification to log into my Google account since so much of my online life is so deeply integrated with Google - email, voice, wallet, play, et al. One of my Android phones is an old Motorola running 2.2 Froyo. Apparently, you can only use 2-step verification with Android devices that are after 2.3 Gingerbread. I use the old phone as a WiFi only device and not as my main phone, but it will be pretty useless if I can't log on to Google accounts. Is there a way to use the old 2.2 phone with 2-step authentication?

Topic: Security
Answer this Question

Answers

2 total
wstark
Vote Up (20)

Yes, you can still use it, you just have to set it up a little differently. You will need to get an "application specific password" or ASP when you set-up your verified devices. Go to the "authorizing applications & sites" page under Google Account settings. The set-up page for 2-step authentication will offer the option of generating an ASP and once you select it and generate an ASP you can enter it into the window that will pop up on your phone. Enter it, and you are good to go. Once you go through this process, the older phone will work just fine with 2-step verification.  I also suggest installing Google Authenticator (free from Google Play)  on your mobile device once you have completed initial set-up. Hope this helps. Google also has a page that walks you through the process.

jimlynch
Vote Up (13)

Here's some info from the Google support page:

About 2-step verification
http://support.google.com/accounts/bin/answer.py?hl=en&answer=180744

Ask a question

Join Now or Sign In to ask a question.
The cybersecurity profession and its role in keeping the Internet safe is lost among young adults, who are therefore less likely to pursue a career in the field, a survey shows.
Don't think for an instant that once POS malware is defeated the first time, it's gone for good. These attacks have a habit of resurrecting themselves, with a lot of help from criminal hackers.
Researchers have discovered hackers trying to exploit the Shellshock Bash vulnerability to compromise network attached storage devices in universities in the U.S., Japan and Korea.
McAfee issues its annual list of the most dangerous people to search for online -- as in, you might get a virus if you do.
FireEye has detected Shellshock attacks against network-attached storage devices made by Taipei-based QNAP and used by universities and research institutes in Korea, Japan and the U.S.
The leader of the now-disbanded LulzSec hacking group directed members to attack targets in dozens of countries, including the U.K., Turkey, Brazil and Australia, even as he was serving as an FBI informant, according to a news report.
The Xen Project has revealed the details of a serious vulnerability in the Xen hypervisor that could put the security of many virtualized servers at risk.
The Joomla project pushed out new updates for its popular content management system Wednesday after a glitch was found in the high-priority security patches it released a day before.
Virtual private network servers based on OpenVPN might be vulnerable to remote code execution attacks through Shellshock and other recent flaws that affect the Bash Unix shell.
Günther Oettinger, the European Union's proposed Commissioner for the Digital Economy and Society, gave a disappointing performance at his confirmation hearing, dodging questions and calling the victims of a recent data breach "dumb."

White Papers & Webcasts

See more White Papers | Webcasts