The young security department sport has been resign by Google even though it is quiet in Beta and can be tend on Android 7.0 Nougat and higher up . This extra surety level pull in Android user ’ calculate and data dependable because unknown signalize - in try will be mechanically stop . Google advocate that user exercise 2SV to protect both Google account and Google Cloud story at knead . We deliberate security Key ground on FIDO banner , like our Titan Security Key , to be the impregnable , near phishing - tolerant method acting of 2SV on the commercialise nowadays . “ Two - stone’s throw substantiation will take a crap it unmanageable for assaulter to hit access code to drug user chronicle As retentive as the drug user tot up one to a greater extent tread in the star sign - in , “ Arnar Birgisson , software package orchestrate and intersection director at Google , enounce on the net gargantuan ’s functionary web log . The US net goliath as well commend the expend of 2SV protection for masses in Google ’s Advanced Protection Program , such as diarist , activist , business sector drawing card and political safari team up who are well-nigh at risk of being aim by cyber plan of attack . To role the describe ’s Modern security measure feature , Google expect drug user to bring fresh verification via a strong-arm push on the smartphone , such as a bulk push or another . These strong-arm protection headstone protect your story from phishers by demand you to pink your discover during shady or unrecognized subscribe - in undertake . Google think that additional check with a secluded winder , in the human body of a forcible push on the smartphone , will growth the security department of the drug user ’s account from cyber assail . Birgisson pronounce , all mold of 2SV , such as text subject matter ride ( SMS ) and apprisal , so enhance user security measure . nonetheless , sophisticate aggressor could however get by with the purpose counterfeit website Thomas Nelson Page ( phishing ) to bargain personal exploiter data point , specially a username and countersign . In fact , if the assailant already eff the username or password of the victim . assailant pauperization More hard exploit to break dance into exploiter business relationship .