How to Enable Two-Factor Authentication on Amazon
Holiday shopping is in full swing this week as we enter the eighth day of the 12 Days of 2FA. Today we’ll look at how to enable two-factor authentication on Amazon to protect your financial information, shopping preferences, and purchases.
Amazon supports 2FA via both text...
How to Enable Two-Factor Authentication on Dropbox
As the 12 Days of 2FA continue, we wrap up the week with a guide to enabling two-factor authentication on Dropbox. Dropbox supports 2FA over SMS or over one of several popular authentication apps.
On a cloud storage and sharing service like Dropbox, protecting shared...
Voting with Risk-Limiting Audits: Better, Faster, Cheaper
Election audits ought to be like an annual checkup, not a visit to the emergency roomAfter extensive ups and downs, the election recount efforts in Michigan, Wisconsin, and Pennsylvania have concluded. The main lesson: ballot audits should be less exciting and less expensive. Specifically, we need to make audits...
How to Enable Two-Factor Authentication on Twitter
For the sixth day of the 12 Days of 2FA, we turn to Twitter. Twitter calls its two-factor authentication system “Login Verification,” but the idea is exactly the same: signing in from a new browser will require something you have (like your phone) as well as something...
Investigating Law Enforcement’s Possible Use of Surveillance Technology at Standing Rock
One of the biggest protests of 2016 is still underway at the Standing Rock Sioux Reservation in North Dakota, where Water Protectors and their allies are fighting Energy Transfer Partners’ plans to drill beneath contested Treaty land to finish the Dakota Access Pipeline. While the world has been watching...
How to Enable Two-Factor Authentication on Facebook
For the fifth day of the 12 Days of 2FA, we turn to the world’s largest social media platform: Facebook. Facebook calls its two-factor authentication “Login Approvals,” but the idea is exactly the same: signing in from a new browser will require something you have (like your phone) as...
San Francisco Passes Ordinance to Protect ISP Competition
New Law Will Help Preserve Net Neutrality and Privacy at the Local Level
San Francisco EFFers: you did it! Thanks in part to your phone calls and tweets to the Board of Supervisors, the Board unanimously passed an ordinance last night that will address the problem of landlords...
Not So Voluntary: White House IP Czar Promotes Shadow Regulation of the Internet
Should IP rights be enforced via shadow regulations that aren’t vetted or endorsed by users? According to a just-released report, the U.S. Intellectual Property Enforcement Coordinator (IPEC) thinks they should. We disagree.
We’ve written here about the danger posed by Internet regulation done through private agreements. These agreements,...
Second Annual Report Rates Mexican Telecoms on how well they Protect User Privacy
Red en Defensa de los Derechos Digitales (R3D)—the leading Mexican digital rights organization—has released the 2016 ¿Quién defiende mis datos? report, which evaluates how well Mexican telecommunications companies protect their customers’ privacy. R3D’s second annual report examines publicly-available policies from eight of the biggest telecommunications companies: AT&T,...
How To Enable Two-Factor Authentication on Outlook.com and Microsoft
The last email service we’ll cover in the 12 Days of 2FA is Outlook.com. If we haven’t covered your email service here, check twofactorauth.org’s more extensive list of email platforms that offer two-factor authentication. If you only enable 2FA for one account, email is a good choice...







