<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Twitter on Teddy Ferdinand</title><link>https://tferdinand.net/en/tags/twitter/</link><description>Recent content in Twitter on Teddy Ferdinand</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Sun, 16 Aug 2020 05:09:14 +0000</lastBuildDate><atom:link href="https://tferdinand.net/en/tags/twitter/index.xml" rel="self" type="application/rss+xml"/><item><title>What the Twitter hack teaches us (or reminds us of)</title><link>https://tferdinand.net/en/what-the-twitter-hack-teaches-us-or-reminds-us-of/</link><pubDate>Fri, 17 Jul 2020 22:00:00 +0000</pubDate><guid>https://tferdinand.net/en/what-the-twitter-hack-teaches-us-or-reminds-us-of/</guid><description>&lt;p&gt;A few days ago, Twitter was the target of a hack inviting, via &amp;ldquo;verified accounts&amp;rdquo;, users to send BitCoins to receive double the amount. I suggest a small post on what we can learn from this attack, from a computer security point of view.&lt;/p&gt;
&lt;h4 id="disclaimer"&gt;Disclaimer&lt;/h4&gt;
&lt;p&gt;The purpose of this article is not to make an umpteenth analysis of this attack, but rather to recall some basic rules of computer security that this attack reminds me of.&lt;/p&gt;</description></item></channel></rss>