How to use Google 2-step verification with an older smartphone?

delia25

I've finally started practicing what I preach and using 2 step verification to log into my Google account since so much of my online life is so deeply integrated with Google - email, voice, wallet, play, et al. One of my Android phones is an old Motorola running 2.2 Froyo. Apparently, you can only use 2-step verification with Android devices that are after 2.3 Gingerbread. I use the old phone as a WiFi only device and not as my main phone, but it will be pretty useless if I can't log on to Google accounts. Is there a way to use the old 2.2 phone with 2-step authentication?

Topic: Security
Answer this Question

Answers

2 total
wstark
Vote Up (18)

Yes, you can still use it, you just have to set it up a little differently. You will need to get an "application specific password" or ASP when you set-up your verified devices. Go to the "authorizing applications & sites" page under Google Account settings. The set-up page for 2-step authentication will offer the option of generating an ASP and once you select it and generate an ASP you can enter it into the window that will pop up on your phone. Enter it, and you are good to go. Once you go through this process, the older phone will work just fine with 2-step verification.  I also suggest installing Google Authenticator (free from Google Play)  on your mobile device once you have completed initial set-up. Hope this helps. Google also has a page that walks you through the process.

jimlynch
Vote Up (11)

Here's some info from the Google support page:

About 2-step verification
http://support.google.com/accounts/bin/answer.py?hl=en&answer=180744

Ask a question

Join Now or Sign In to ask a question.
Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions.
Financial institutions use many technologies to fight crime, but much of the work comes too late, focusing on suspicious activity, like uncharacteristic charges or money transfers, after it happens.
Dennis Technology Labs says it tested it because of marketing claims for it; Malwarebytes says free version of product is just a clean-up tool.
A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.
The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.
Public certificate authorities (CAs) are warning that as of Nov. 1 they will reject requests for internal SSL server certificates that don't conform to new internal domain naming and IP address conventions designed to safeguard networks.
European data protection authorities still have questions after meeting with Google, Microsoft and Yahoo about the implementation of a recent ruling that gave European citizens the right to be forgotten by search engines.
An iPhone user has filed a lawsuit for invasion of privacy against Apple, about a week after a Chinese state broadcaster raised security concerns about the device's location-tracking functions.
Handling a software flaw can be messy, both for a security researcher who found it and for the company it affects. But a new set of guidelines aims to make that interaction less mysterious and confrontational.
A hacker group calling itself "Anonymous Kenya" has poked holes at the government's cybersecurity preparedness by hacking two official Twitter accounts.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness