Home » Twitter power

Comments

Twitter power — 6 Comments

  1. My view is – we should see the “Administrative Console” and it’s training video for Twitter employees.

    I hope somebody shows how easy it is to pick on one person by producing this video.

  2. Apparently this is not the first time a departing employee has messed with an account. Many years ago I worked at a wireless company and the billing system had a feature to lock and hide VIP accounts specifically so that we entry-level employees could not take a peek or do damage (for example, they locked down Charles Stewart’s account after his infamous crime). Either Twitter lacks some basic security features in-house, or it was not really an entry-level employee who did this. Regardless, this is a huge PR problem, as I imagine all those celebrities whose Apple cloud accounts were hacked are likely wondering who at Twitter’s been reading their DMs.

  3. The Alt Right has been creating Alt Tech, to replace wikipedia and twitter and Kickstarter.

    Look it up, while you still have free will.

  4. Trying to fight against the Left using twitter, is sort of like Islam fighting the USA by funding the NRA.

  5. Imagine what a rogue actor highly placed in the current NSA or IRS could do. Edward Snowden spent a great deal of time pulling off his theft. His capabilities within the NSA structure were almost unlimited and devoid of any meaningful oversight. It seems to me that the odds are extremely high that there are at least a couple skilled and disciplined (not rogue) spies installed in such positions at any given time.

  6. TommyJay Says:
    November 6th, 2017 at 12:20 pm
    Imagine what a rogue actor highly placed in the current NSA or IRS could do. Edward Snowden spent a great deal of time pulling off his theft. His capabilities within the NSA structure were almost unlimited and devoid of any meaningful oversight. It seems to me that the odds are extremely high that there are at least a couple skilled and disciplined (not rogue) spies installed in such positions at any given time.
    * *
    The name “Awan” springs to mind – now imagine their clones in every sensitive network in America.

Leave a Reply

Your email address will not be published.

HTML tags allowed in your comment: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>