As the 12 Days of 2FA continue, we wrap up the week with a guide to enabling two-factor authentication on Dropbox. Dropbox supports 2FA over SMS or over one of several popular authentication apps.
On a cloud storage and sharing service like Dropbox, protecting shared files often means working with others. Protecting your account with 2FA gives your documents and files the best security when the people you share them with do the same. For a more comprehensive list of cloud services that support 2FA, check twofactorauth.org.
See below for steps to enable 2FA on Dropbox, and share this tutorial so your friends and colleagues can learn how, too.
Click on your name in the top right corner and choose “Settings.” Your settings page will open in a separate tab.
Click the “Security” tab. Under “2-Step Verification,” click “Click to enable.”
Click “Get started.”
At this point you’ll be asked to enter your password. Enter it and click “Next.”
Now you have a choice between using text messages or an authenticator app as your primary 2FA method. Using text messages is selected by default. Authenticator apps are more secure and avoid a lot of the downfalls of SMS. However, text messages can be more practical if you do not use a smartphone. Consider your threat model and choose the best mode for you.
If you want to use an authenticator app, select “Use a mobile app” and click “Next.” Open your authenticator app on your mobile phone, scan the QR code, and click “Next.” Enter the code from your authenticator app (without any spaces) and click “Next.”
If you want to use text messages, select “Use text messages” and click “Next.” Enter a mobile phone number at which you can receive texts and click “Next.”
Shortly after you click, you will receive a text message with your verification code. Enter it and click “Next.”
Regardless of the method you chose, you can finish up by choosing an (optional) backup phone number at which you can receive texts if you can’t access your authenticator app or primary phone number.
Finally, you’ll get backup or recovery codes. Write these down or print them and keep them in a safe place. Click “Next” and you’re finished.
Back at your security settings, you can view your recovery codes and generate more, enable a hardware security key, and edit your primary and backup 2FA modes.
Stay tuned for more posts on two-factor authentication during the 12 Days of 2FA.
Related Issues
Security
Privacy
Join EFF Lists
Related Updates
Deeplinks Blog by David Greene, Eva Galperin | August 30, 2024
The French Detention: Why We're Watching the Telegram Situation Closely
EFF is closely monitoring the situation in France in which Telegram’s CEO Pavel Durov was charged with having committed criminal offenses, most of them seemingly related to the operation of Telegram. This situation has the potential to pose a serious danger to security, privacy, and freedom of expression for...
Deeplinks Blog by Paige Collings, Starchy Grant | August 13, 2024
Digital Apartheid in Gaza: Big Tech Must Reveal Their Roles in Tech Used in Human Rights Abuses
This is part two of an ongoing series. Part one on unjust content moderation is here. Since the start of the Israeli military response to Hamas’ deadly October 7 attack, U.S.-based companies like Google and Amazon have been under pressure to reveal more about the services they provide...
Deeplinks Blog by Rory Mir | August 1, 2024
CrowdStrike, Antitrust, and the Digital Monoculture
Last month’s unprecedented global IT failure should be a wakeup call. Decades of antitrust inaction have made many industries dangerously reliant on the same tools, making such crises inevitable. We must demand regulators break up the digital monocultures that are creating a less competitive, less safe, and less free...
Deeplinks Blog by Karen Gullo | July 30, 2024
Calls Mount—from Principal UN Human Rights Official, Business, and Tech Groups—To Address Dangerous Flaws in Draft UN Surveillance Treaty
As UN delegates sat down in New York this week to restart negotiations, calls are mounting from all corners—from the United Nations High Commissioner for Human Rights (OHCHR) to Big Tech—to add critical human rights protections to, and fix other major flaws in, the proposed UN surveillance treaty, which as...
Deeplinks Blog by Karen Gullo | April 1, 2024
Ola Bini Faces Ecuadorian Prosecutors Seeking to Overturn Acquittal of Cybercrime Charge
Ola Bini, the software developer acquitted last year of cybercrime charges in a unanimous verdict in Ecuador, was back in court last week in Quito as prosecutors, using the same evidence that helped clear him, asked an appeals court to overturn the decision with bogus allegations of unauthorized access...
Deeplinks Blog by Paige Collings | March 8, 2024
Four Voices You Should Hear this International Women’s Day
Around the globe, freedom of expression varies wildly in definition, scope, and level of access. The impact of the digital age on perceptions and censorship of speech has been felt across the political spectrum on a worldwide scale. In the debate over what counts as free expression and how it...
Deeplinks Blog by Paige Collings, Thorin Klosowski | March 8, 2024
Four Infosec Tools for Resistance this International Women’s Day
While online violence is alarmingly common globally, women are often more likely to be the target of mass online attacks, nonconsensual leaks of sensitive information and content, and other forms of online violence. This International Women’s Day, visit EFF’s Surveillance Self-Defense (SSD) to learn how to defend yourself and...
Deeplinks Blog by Karen Gullo | February 7, 2024
Protect Good Faith Security Research Globally in Proposed UN Cybercrime Treaty
Statement submitted to the UN Ad Hoc Committee Secretariat by the Electronic Frontier Foundation, accredited under operative paragraph No. 9 of UN General Assembly Resolution 75/282, on behalf of 124 signatories. We, the undersigned, representing a broad spectrum of the global security research community, write to express our serious concerns...
Deeplinks Blog by Karen Gullo | February 7, 2024
Draft UN Cybercrime Treaty Could Make Security Research a Crime, Leading 124 Experts to Call on UN Delegates to Fix Flawed Provisions that Weaken Everyone’s Security
Security researchers’ work discovering and reporting vulnerabilities in software, firmware, networks, and devices protects people, businesses and governments around the world from malware, theft of critical data, and other cyberattacks. The internet and the digital ecosystem are safer because of their work.The UN Cybercrime Treaty,...
Deeplinks Blog by Cooper Quintin | January 31, 2024
Worried About AI Voice Clone Scams? Create a Family Password
Your grandfather receives a call late at night from a person pretending to be you. The caller says that you are in jail or have been kidnapped and that they need money urgently to get you out of trouble. Perhaps they then bring on a fake police officer or kidnapper...