Twitter Digits Is A New Way To Login And Access Web

Back in October 2014 in a conference, Twitter had announced a new method of authentication and logging in to apps and now they have finally released the service. Digits is the social networking giant’s plan that gives a new way for logging into the mobile app’s websites. Twitter has claimed that the new system is a solution that has been made keeping the mobile developers in mind.

Here is how it will work. When the user tries logging on the web for the very first time, Digits will ask them their cell phone number. User will then receive a confirmation code on the entered number which they will use to authenticate themselves. After this, if the user wishes to access any other site, which uses Digits for verification, the step of SMS corroboration will automatically be skipped by Digits thus allowing them to login directly without any need to remember and enter the password again. It means that the users have to login just once to access all the services and apps used in the device.

digits-twitter-1

digits-twitter-2

It is definitely a boon for web developers who code for mobile. Twitter claims that using Digits is simple and can be implemented with a handful lines of code. The authentication service can be implemented on any button of developer’s choice without any trouble and will improve the websites login conversion rates substantially.

Developers don’t have to worry about the hassles of OAuth which they come across with other web login services. For installation they simply have to include Twitter’s JavaScript SDK and they are good to go. Twitter has even said that their library will auto-update and won’t interfere with the developer’s site, either mobile or desktop, in any manner whatsoever. Twitter’s VP of product for revenue Kevin Weil said that they want Twitter to be viewed as mobile services company and not just as a consumer app.

Interested developers can refer #-Link-Snipped-#for more details on how to use this new feature provided by Twitter.

Source: #-Link-Snipped-#

Replies

  • Ankita Katdare
    Ankita Katdare
    Is it only me or there's nothing new about this system, just a fancy name?
    What do you think #-Link-Snipped-#?
  • Jason Estibeiro
    Jason Estibeiro
    It provides just a simple login APK using the persons mobile number.
  • hitoshianatomi
    hitoshianatomi
    2 is larger than 1 on paper, but two weak boys in the real world may well be far weaker than a toughened guy. Physical tokens and phones are easily left behind, lost, stolen and abused. Then the password would be the last resort. It should be strongly emphasized that a truly reliable 2-factor solution needed for important accounts requires the use of the most reliable password.

    By the way, some people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Something belonging to the password(PIN, passphrase, etc)and something dependent on the password (ID federations, 2/multi-factor, etc) cannot be the alternative to the password. Neither can be something that has to be used together with the password (biometrics, auto-login, etc).

    At the root of the password headache is the cognitive phenomena called “interference of memory”, by which we cannot firmly remember more than 5 text passwords on average. What worries us is not the password, but the textual password. The textual memory is only a small part of what we remember. We could think of making use of the larger part of our memory that is less subject to interference of memory. More attention could be paid to the efforts of expanding the password system to include images, particularly KNOWN images, as well as conventional texts

You are reading an archived discussion.

Related Posts

I still believe in the spring energy storage concept and quite frankly do not believe the status quo of it being a non thing. So I am going to a...
After introducing the Iris Alpha earlier this month, the Indian mobile manufacturer Lava has unveiled a new entry level smartphone Iris 350. The phone is listed on the company’s official...
I am just unable to understand that when ROM is only read only memory ,then how is the compiler able to store the variables with const keyword inside ROM ,although...
Quote: There’s something slightly terrifying about the phrase “Google’s humanoid robot”. The technology company this week announced that Atlas, the device being used as a testbed in the US government’s...
Microsoft researchers are really on to something these days with their R&D department churning out some of the most amazing innovations ever since the start of 2015. We witnessed the...