Adding an extra layer of security to your online accounts is grandmas private home family sex videosa fundamental step to protect your digital life from hackers, but what's the point if the new methods are just as vulnerable as the old ones?
It's a question some Twitter users are asking after discovering that the two-factor authentication on their accounts isn't as secure as it seems.
SEE ALSO: The software that could prevent ISPs from selling your browsing history could also just make things worseBut let's back up for a second. No matter who you are, having your Twitter hacked would be a major bummer. In the case of political figures like Donald Trump, however, a hijacked account means more than just a headache — think of the havoc a fake policy pronouncement could wreak?
And so it was welcome news back in 2013 when Twitter rolled out two-factor authentication (2FA) to all of its users. This added layer of security allows users to protect their accounts, even if their passwords had been stolen, by requiring a second login credential sent via text message.
Great, right? Well, kinda.
While SMS-based 2FA does provide additional protection, there's a big problem with it. Namely, SMS itself isn't secure. A flaw in what is known as Signaling System 7 protocol (SS7) — something that allows different phone carriers to communicate back and forth — means that hackers can redirect texts to practically any number they want.
That means your SMS verification code could end up being sent directly to the cellphone of your hacker.
And this is not just theoretical. In January of 2017, reports Ars Technica, a group of criminals exploited this flaw to snatch victims' SMS verification codes and drain their bank accounts.
So, with text-based 2FA known to have a security hole so large you could drive a truck through it, Twitter helpfully introduced additional ways to set up 2FA. Users who already have access to their accounts via the Twitter mobile app can use something called a login code generator, but as this requires already being logged in on mobile it doesn't help if you're signed out.
The other method, a 3rd-party authenticator app, offers a better option. These apps, like Google Authenticator, generate a number sequence on your phone as your verification code — no vulnerable text message required.
Problem solved, right?
Not so fast. Because here's the thing, even with an authenticator app enabled Twitter still sends out SMS verification codes. That's right, the people that have taken the extra step to secure their Twitter accounts with an authenticator app — arguably the people most concerned about having their accounts hacked — are still just as vulnerable as those who rely on SMS-based verification codes.
And this has not gone unnoticed.
This Tweet is currently unavailable. It might be loading or has been removed.
This Tweet is currently unavailable. It might be loading or has been removed.
This Tweet is currently unavailable. It might be loading or has been removed.
This Tweet is currently unavailable. It might be loading or has been removed.
This Tweet is currently unavailable. It might be loading or has been removed.
Users are rightly wondering what's the point of having a 3rd-party authenticator app set up if Twitter still send out text messages with the codes.
Twitter, for its part, is staying silent on the matter.
We reached out to the company and exchanged multiple emails with numerous employees who all categorically refused to explain if there was any way to disable SMS-based 2FA verification codes while maintaining a 3rd-party authenticator app, as well as why that would be the case.
One spokesperson simply responded the company had "nothing to share on our 2FA beyond what's in our help center." To be clear, the help center does not address this issue.
What about just deleting your phone number from your Twitter account? Then it can't send you texts, right? Go ahead, but then you can no longer use the 3rd-party authenticator app.
The company, through spokespersons, also refused to comment on the SS7 exploit rendering SMS vulnerable to hackers.
For the average Twitter user, a text message-based verification code — despite its flaws — is a great added layer of security. However, as demonstrated by the criminals that emptied bank accounts in January, a determined hacker can bypass this security measure.
And maybe this just a bug affecting some users' accounts, and not each and every one of Twitter's users with 3rd-party 2FA apps. Twitter's refusal to discuss the matter, however, means we don't know.
For you and I, this might not be that big of a deal at the end of the day. For celebrities, politicians, and members of the Silicon Valley elite? Well, that's a different matter — and it's one that Twitter should quickly address.
Topics Cybersecurity X/Twitter
Twitter is so sorry it 'inadvertently' used your 2FA phone number for adsPenzeys Spices spent so much on impeachment ads on FacebookPolice say abandoned SD card labeled 'homicide' led to arrest of murder suspectWhy you should lie in your passwordYes, your boss can read your Gmail drafts (and that's not all)What critics thought about 'El Camino: A Breaking Bad Movie'Trump's 'Easy D' tweet took the internet straight to penis jokesJustin Bieber returns to Instagram and blesses us with 'SOO MUCH CONTENT'The internet is desperately trying to reunite this lost teddy bear with its ownerHow #DeleteUber serves as a stark warning for all startupsCalifornia just scored a major privacy win against facialVSCO girls: Shield your eyes while this hydraulic press crushes a Hydro FlaskHow #DeleteUber serves as a stark warning for all startups7 gift subscriptions that give backTesla cars to get fart and goat horn sounds soonTwitter is so sorry it 'inadvertently' used your 2FA phone number for adsHow ‘Are You Afraid of the Dark’ will scare a new generation of kidsSocial media campaign aims to highlight persecution of LGBTQ peopleFacebook coTesla cars to get fart and goat horn sounds soon Tencent profit grows 54% y China’s CATL and French shipping firm CMA CGM to set up joint venture · TechNode JD gives employees both carrots and sticks amid market pressure · TechNode TSMC unveils A16 technology, plans mass production by 2026 · TechNode Price war shows little impact on JD retail margin as e Chinese government filings reveal details of BYD’s latest compact hatchback · TechNode NVIDIA cuts prices in China amid competition with Huawei chips: report · TechNode US weighs further limits on China's access to advanced AI chip technology · TechNode Online retailer JD faces backlash from local book publishers amid low China’s Great Wall Motor to shut down European office as EV tariffs loom · TechNode Baidu’s core advertising remains weak in Q1, GenAI boost cloud revenue · TechNode TikTok tests 60 Xiaohongshu says reports of new funding based on $20 billion valuation are “untrue” · TechNode Alibaba to provide wholesale power to Mongolian consumers in latest expansion · TechNode Tencent’s mobile version of Dungeon and Fighters overwhelmed at launch · TechNode NIO expects sales to bounce back in Q2, gives update on third brand · TechNode Alibaba opens new campuses in Hangzhou and Beijing on the same day · TechNode Temu aims to triple sales to $60 billion globally in 2024: report · TechNode ByteDance fires 61 employees in anti NetEase announces beta testing for mobile version of Octopath Traveler on May 16 · TechNode
0.829s , 10519.5390625 kb
Copyright © 2025 Powered by 【grandmas private home family sex videos】,Steady Information Network