Twitter security settings


Як з’явився Твіттер ?

Twitter’s origins date back to early 2006, when New York University student Jack Dorsey shared a new idea for online communication with some of his colleagues at Odeo, a podcast production company. Dorsey’s idea was to create a platform that allowed users to exchange short messages with groups of people, similar to sending text messages. The first version of this platform was called twttr and was used exclusively by people who worked at Odeo. On July 15, 2006, Twitter was introduced to the public. In the early months, the site started out receiving about 20,000 tweets a day, but that number rose to 60,000 in 2007, when Twitter became a hot topic. Read our step-by-step guide on how to set up security for Twitter. And don’t just read it (this one action is not enough), but start thinking about your safety right now – you have direct instructions for action! So go ahead!

Twitter allows you to be heard, helps you find like-minded people, gives you the opportunity to gain some experience, get new information and hear different opinions and statements. Twitter can be a tool for promoting your own ideas, it can be useful for making new acquaintances. Your goals and objectives for signing up for Twitter may vary, but one thing remains the same: your safety should be more important than anything you write as an author (although of course it’s cool if the content is decent). You will benefit greatly from setting up security on Twitter. Conversely, a lack of proper security when using Twitter can create problems that can cause serious harm to you (such as phishing or messages from scammers). Be vigilant: the information space respects those who care about their own safety! Also remember the basic ethical principles of behavior in social networks and the rules of cyber hygiene – this is very important.


Step 1

Go to Twitter

Step 2

Go to the section “Information”

Step 3

Click on “Gear”

Step 4

Click on the invisible arrow

Step 5

Click on the “Security and profile access” section

Step 6

Click on “Security”

Step 7

Next “Two-factor authentication”

Step 8

Drag the “Appendix to authentication” slider

Step 9

And click “Let’s start”.

Step 10

Click on the underlined text

Step 11

We take a screenshot and, for convenience, transfer it to a safe place

Step 12

Go to Google Authenticator

Step 13

Go to Google Authenticator

Step 14

We scan and rejoice in reliable security

Found an error?
If you find an error, take a screenshot and send it to the bot.