With Twitter in chaos, some methods to guard your account

With Twitter in chaos, some ways to protect your account

The Twitter emblem is seen on the social media firm’s headquarters in San Francisco on Friday, Nov. 11, 2022. Credit: Stephen Lam/San Francisco Chronicle through AP

Twitter is in chaos. Elon Musk, its new proprietor, has decimated its workers and this week gave these remaining an ultimatum—work grueling hours and be “extraordinarily hardcore ” or depart. Hundreds selected the latter and headed for the door.

There are already indicators that the exodus is stressing the system. Some customers observed issues receiving texts to register with two-step verification. Test pages are displaying up within the wild. Some customers are seeing a renewed barrage of spam in direct messages and on their feed, whereas others complain of receiving new replies to long-deleted tweets and seeing saved tweet drafts disappear. Still, the chicken web site is chugging alongside.

In article ad

Twitter will not merely shut down in a single day. But security experts warn that the drastic job cuts might might open the door to unhealthy actors exploiting the platform’s vulnerabilities and compromising user accounts.

While there’s not a lot you are able to do about Musk’s on-the-fly teardown of one of many world’s key on-line data ecosystems, there are steps to guard your account should you, like hundreds of thousands of different Twitter customers, are usually not able to flee the coop in search for an alternative.


If you solely use your login and password to register to Twitter, it is essential, particularly now, so as to add an additional step to the method so it turns into tougher for hackers to entry your account.

Twitter has three strategies to select from: Text message, an authentication app or a safety key. Since there have been some glitches with customers not receiving textual content messages to authenticate their accounts, and since it’s typically thought of a safer choice, utilizing the authentication app might be your greatest wager.

To do that, you have to to obtain one in all various out there purposes to your system. They are free within the Apple or Android app shops and a few examples embrace Google or Microsoft Authenticator, Authy, Duo Mobile and 1Password.

Once you’ve gotten the app, open the desktop model of Twitter and click on on the icon displaying ellipses in a circle. There, you will discover “Settings and privacy” then “Security and account access” and at last, “Security.” Here, you may choose ” Authentication app” and comply with the directions to set it up. Twitter will ask you to share your email address to do that, in case you have not already.

Once you might be all set, you should use the auto-generated numeric codes out of your authentication app so as to add an additional layer of safety when logging in to Twitter.


Jane Manchun Wong, an impartial software program and safety researcher in Hong Kong who follows Twitter carefully, recommends revoking permissions to third-party websites and apps by your Twitter account.

That’s as a result of if there’s a potential safety downside with Twitter’s API (or Application Programming Interface, which lets third events entry Twitter knowledge to create apps that work with Twitter, as an illustration) with fewer folks working on the firm, patching it up will inevitably take longer.

To flip off this function, begin within the “Security and account access” device and go to “Apps and sessions.” Here, you must discover all of the third-party apps which have are linked to your Twitter account—together with some you will have linked years in the past that not exist—and you’ll revoke entry to every one.


For the nostalgic, for analysis or for the digital hoarders amongst us, the thought of dropping a decade or extra of our tweet historical past is a disaster. Fear not, although. It would possibly take a while, however you may obtain your Twitter “archive” if you would like to make sure it is preserved—simply in case.

As with different extra advanced options, this device is just out there on the desktop model of Twitter, within the “Your account” part of settings. You must enter your password once more and undergo two-factor authentication in case you have that arrange. When your archive is able to obtain, you’ll get a notification on Twitter. Again, you’ll have to obtain it on the desktop model of the location. While usually this course of takes about 24 hours, it might take longer now. Some customers have additionally reported having to strive greater than as soon as.


While there’s no perfect replacement for Twitter—and naturally Twitter remains to be right here!—many customers, particularly these in journalism, tech and academia, are signing up for Mastodon, a beforehand little-known platform that launched in 2016. Mastodon is a decentralized social community. That means it is not owned by a single firm or billionaire. Rather, it is made up of a community of servers, every run independently however in a position to join so folks on totally different servers can talk. Signing on will be difficult—you have to to select a “server” to hitch, however no matter which one you select, you may nonetheless talk with folks on different servers, form of like how one can e-mail folks out of your Gmail account even when they’re on Outlook or one other e-mail server.

Once you are in, you may go to fedifinder.glitch.me and discover your Twitter following or any Twitter lists you may need to see if additionally they have Mastodon accounts. Many Twitter users are additionally itemizing different social networks and content material data of their bios and even Twitter show names so folks can get in contact with them—simply in case.

© 2022 The Associated Press. All rights reserved. This materials is probably not revealed, broadcast, rewritten or redistributed with out permission.

With Twitter in chaos, some methods to guard your account (2022, November 18)
retrieved 18 November 2022
from https://techxplore.com/news/2022-11-twitter-chaos-ways-account.html

This doc is topic to copyright. Apart from any truthful dealing for the aim of personal research or analysis, no
half could also be reproduced with out the written permission. The content material is supplied for data functions solely.

Source link

Leave a reply

Please enter your comment!
Please enter your name here